last executing test programs: 13.289600618s ago: executing program 1 (id=1528): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000400)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r0, &(0x7f00000054c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1}, 0x7}], 0x1, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 13.017799987s ago: executing program 1 (id=1530): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0xc}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_DATA_TYPE={0x8}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x0, 0x84}}}, 0x74}}, 0x0) (fail_nth: 2) 12.933316164s ago: executing program 1 (id=1533): ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000380)={0x0, 0x0}) prlimit64(r1, 0xe, &(0x7f0000000340)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) flistxattr(r0, 0x0, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r5, 0x4020565a, &(0x7f0000000300)={0x5, 0xfffffffa, 0x1}) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg$inet(r0, &(0x7f0000004bc0)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000f00)="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", 0x106}], 0x1}}, {{0x0, 0x5e, &(0x7f0000000b40)=[{&(0x7f0000000700)="acc841985992b79554acfc02163bb0fb2bb293e68702bb40b6b870bde5700d3687", 0x21}, {&(0x7f0000000740)="b1f56ee29c433328d3b2a83bd97e37007087acae7568edff43ed556d76770122635aea1dc4875538", 0x28}], 0x2}}, {{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000b80)="1ee88f78de7d57006d8ffa3f1d92c228a43f6c86558705d98691e6344fa3745cc92c1f80fc01a77c28bb77872fc4f9be9660bb62708d0f52f4958fb4cc5144775062cc", 0x43}, {&(0x7f0000001bc0)="5c89eeb1aa86c6f680f09cc1c1d4bc5fc6a067d295afd3aa97af3d777b81db48f9ceb270e506af840503c6fbf20760e4cd8df9c220cd0728585229123d5c61507d00561b8f1a15e64fa2779be424fdeff46058eaee7acfc80b2ae9840e9ac1e33ac8378c98695a08bdb8f2a756b1704c036e3b0ff2d1e9d397a82e24debd371e6855b7dc2dea47d57a9dfbf4fb2ccb3f975c3851c6b5399ab80c4ba95604f70a69674cfe820d82fb06b243625a8a9e4ee52e7c2ec4d63241fb00efd1a485a36dfb4a7dd573c6584c4afc55b3ff0a93509fe41aa0e8892c95ccad3e0435071aff78177e946cf231de4f389b695c5f49772b8abb6b88226fd4c2b0c57d47b98f2aa1b2ec38c4a97f3783023f04cdb380dd6a00d2fc63c932a9876863728e1fcb245109713c16375ffc68b041b86f737c41233cf2a05e51699db6a0e3c4b82b9ca613bea89cefd2ace608e361379b1aeefb75d0aa2db26dcddc9365a8c02f49af78aa6b41599fa501f9b96824bed5cff2028bb06f3852e69b3e58b659606b7ff7e282473701c95f1da7e742b76392f90a89c65577415c62e2b495027153030cf761b44eb1ce8816f14b71f4ecb066111dea78d77fa4b58bc3b27250a516cd5f90b3df608a06eca61970a028193f5ef07ab0cc90936633e4894831d5294011e1", 0x1de}, {&(0x7f0000000500)="06471fce6a013314db732e50a88f4240c52f94895b3c8039da799e1ce9a79dc830bf11a20dc70885b6398ef975910a04d84b544a61d73be2c4b0ddcb77d70cfa7a57a6d9459b16a78716edd9e7bad238", 0x50}, {&(0x7f0000000580)="e96aa14ff75134eb85c028e54cfe33a07526570fdb14c4e9a06e4e134ce4028ae0bb1ea16e99d00fe4631c8a7be319b33c20c718c43475c41f5e361bf905fa278bf6b9198339ce693cfd7733f87b878ea1da302b346d12cf9c4f4e9b8817d5fe3e8e85a0c74f90b89beaecd8b9611158f0aa8599bab123b8c971a5e2aba5ccef5822b491fcf17dac0d4cc248e1e8a1ad12651b9191978f4122dd5cd76bc68fe30d6274a0722decf624648905122446ba8ed4087dc693018df2ce881e49fe0025a1503bbf5df2", 0xc6}, {&(0x7f0000000780)="1a3433e1184fb319105aa87a96d02355d5523aff56957ae813956b361eef8fcbfe462cdc9863a6dbde1622afa0b30b1ca96488575583eb8ef875a044887b19c7eba9819fe626999d1122", 0x4a}, {&(0x7f0000000880)="21201334223d42e1de8debdc4ce0016855006053ad999b1b9f086a1e00000000000000000000008aeeea0a1421f969a63ab62e50162f18d51c15d413e15dab9a111c10aa83c6", 0x24}, {&(0x7f00000002c0)="5437880c521fae1199835972743545c27438221c36ee193063856728e8", 0x1d}], 0x7}}], 0x3, 0x840) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x11, 0x0, 0x27) 12.781037927s ago: executing program 3 (id=1537): r0 = io_uring_setup(0x30d3, &(0x7f00000000c0)) (async) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x20000023896) mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) (async) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240), 0x42, 0x0) r4 = socket$inet_mptcp(0x2, 0x1, 0x106) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r5, 0xaf01, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r5, 0xaf01, 0x0) (async) bind$rds(r2, &(0x7f0000000200)={0x2, 0x4e24, @loopback}, 0x10) (async, rerun: 64) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e22, @multicast1}, 0x10) (async, rerun: 64) r6 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) (async) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) sendto$inet(r4, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00') close_range(r7, 0xffffffffffffffff, 0x0) (async) syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f00000000c0)=ANY=[@ANYBLOB="12010000020000102505a1a44000010203010902e6fc02010000000904000001020d0000050b06000105240000000d240f010000000000"], 0x0) ioctl$SIOCRSGCAUSE(r7, 0x40095505, 0x0) (async) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) read$FUSE(r3, &(0x7f00000077c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r3, &(0x7f0000004200)={0x50, 0x0, r8, {0x7, 0x1f, 0x0, 0x2066012}}, 0x50) (async) syz_fuse_handle_req(r3, &(0x7f00000042c0)="000000000000000000000000000000000000000000000000000000000000000090c400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000542d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ea8286a2fba523440000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000633956a1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007d6ab715107fa1820000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffffffffffff0000000000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e1ffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f4000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000286071480000000000b13bc1e6d970884f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f3ffffffffffffff00", 0x2000, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async, rerun: 64) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) (rerun: 64) syz_fuse_handle_req(r3, &(0x7f00000021c0)="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", 0x2000, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000004000000000065700000000000000000000007e0000000000000064de053d544dad9605139c604d440943f76615cb4c87855e8c3c557633ec5f2ef5901141970ff304ea5bac39e99ceffb612d9150607f6ac1796d9e5e62aa5d07482cbd5f0d8558ad982316df421f27b2c461f5febbdce54ca550ae668c840abfacc69d664001ed15d3e61e203bf01495bda8840be3000000000000000000"], 0x0, 0x0}) (async, rerun: 32) getdents64(0xffffffffffffffff, 0x0, 0x4100) (async, rerun: 32) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) (async, rerun: 32) close_range(r0, 0xffffffffffffffff, 0x0) (async, rerun: 32) listen(r6, 0x401) 11.95386244s ago: executing program 3 (id=1540): mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000012c0), 0x0, &(0x7f00000000c0)=ANY=[]) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f00000007c0)) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup(r2) r4 = fcntl$dupfd(r1, 0x0, r2) ioctl$VHOST_SET_VRING_ADDR(r4, 0x4028af11, &(0x7f0000000340)={0x0, 0x80000, 0x0, &(0x7f0000000380)=""/251, 0x0}) ioctl$VHOST_NET_SET_BACKEND(r4, 0x4008af30, &(0x7f0000000080)={0x0, r3}) ioctl$VHOST_SET_VRING_KICK(r4, 0x4008af20, &(0x7f00000000c0)) syz_usb_connect(0x0, 0x24, &(0x7f0000004ec0)={{0x12, 0x1, 0x0, 0xae, 0xe5, 0x91, 0x20, 0xccd, 0x39, 0xa613, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x6, 0x4a, 0xd9}}]}}]}}, 0x0) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) read$FUSE(r0, &(0x7f000001b680)={0x2020, 0x0, 0x0}, 0xfffffffc) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r5, {0x7, 0x1f, 0xc291, 0xd1aba0bb6b80044c, 0x0, 0xffff, 0x20}}, 0x50) 11.936279614s ago: executing program 0 (id=1541): sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="4400000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB], 0x44}}, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000002f80)={0x0, 0x0, &(0x7f0000002f40)={&(0x7f0000000080)=@newtaction={0x14, 0x30, 0x0, 0x70bd2b}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e02003c000b05d25a806f8c6394f90324fc602f00001550000100053582c137153e370248018008061700d1bd", 0xfffffffffffffef2}], 0x1}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f00000003c0)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_WKALM_SET(r3, 0x40187013, &(0x7f0000000080)={0x1, 0x0, {0x0, 0x0, 0x0, 0xb, 0xffffeffd, 0x5}}) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r4, 0x29, 0x2d, &(0x7f0000000240)="ff02040000ffff0200ffffffff1f2be82db1af0000000000eddfcf35bda29d5a20", 0x21) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') statx(r5, &(0x7f00000068c0)='./cgroup\x00', 0x800, 0x2, &(0x7f0000006900)) setsockopt$inet6_IPV6_HOPOPTS(r4, 0x29, 0x36, &(0x7f0000000280)=ANY=[@ANYBLOB="0000000000000000f715ad42217ce1abc665af1702aeaf43461f9293608812583529f1817621928f0585d275f83fde3b9a5cf27b20a8fed9253918364ca670126a83cfb53cda19e44cf46a9a8fd00cd65e01f8a1b4ab5643ff639744b201c81b33d508e9e0950195554aa9f5ade9d21cfdfad56605fff11d747e"], 0x8) chdir(&(0x7f0000000140)='./bus\x00') 11.826752759s ago: executing program 1 (id=1542): mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000012c0), 0x0, &(0x7f00000000c0)=ANY=[]) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f00000007c0)) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup(r2) r4 = fcntl$dupfd(r1, 0x0, r2) ioctl$VHOST_SET_VRING_ADDR(r4, 0x4028af11, &(0x7f0000000340)={0x0, 0x80000, 0x0, &(0x7f0000000380)=""/251, 0x0}) ioctl$VHOST_NET_SET_BACKEND(r4, 0x4008af30, &(0x7f0000000080)={0x0, r3}) ioctl$VHOST_SET_VRING_KICK(r4, 0x4008af20, &(0x7f00000000c0)) syz_usb_connect(0x0, 0x24, &(0x7f0000004ec0)={{0x12, 0x1, 0x0, 0xae, 0xe5, 0x91, 0x20, 0xccd, 0x39, 0xa613, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x6, 0x4a, 0xd9}}]}}]}}, 0x0) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) read$FUSE(r0, &(0x7f000001b680)={0x2020, 0x0, 0x0}, 0xfffffffc) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r5, {0x7, 0x1f, 0xc291, 0xd1aba0bb6b80044c, 0x0, 0xffff, 0x20}}, 0x50) 11.265349004s ago: executing program 3 (id=1543): ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000340)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r3, 0x4020565a, &(0x7f0000000300)={0x5, 0xfffffffa, 0x1}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x11, 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x801, 0x0) 11.263666356s ago: executing program 1 (id=1544): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x11, &(0x7f0000000180)=0x1400200bce) sched_setscheduler(0x0, 0x1, &(0x7f0000002200)=0x1) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000002700)=""/102392, 0x18ff8) clock_getres(0xfffffffffffffff1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) add_key$fscrypt_v1(0x0, &(0x7f0000000140)={'fscrypt:', @desc1}, &(0x7f00000001c0)={0x0, "28d7b07d54891881fe02c1203fe49696b9f26f2da4149683f065714f8a61d1f32c99064bbd27b2aa77459cff33a3a98350f1af9d51ed5bef3d63520d260804d0"}, 0x48, 0xfffffffffffffffd) r2 = socket(0x40000000015, 0x5, 0x0) bind$inet(r2, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = msgget$private(0x0, 0x20) msgrcv(r3, 0x0, 0x0, 0x0, 0x2000) msgrcv(r3, 0x0, 0x0, 0x2, 0x1000) msgsnd(r3, &(0x7f0000001800)={0x2}, 0x8, 0x0) socket(0x15, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) 11.074346s ago: executing program 1 (id=1545): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="58000000020605"], 0x58}}, 0x0) syz_io_uring_setup(0x5c2, &(0x7f0000000140)={0x0, 0x4, 0x0, 0x8000}, &(0x7f0000000240)=0x0, &(0x7f0000000200)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r6, &(0x7f0000000540)=ANY=[], 0x200002e6) fcntl$setpipe(r6, 0x407, 0x7000000) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r7}, 0x10) r8 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x111101, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000000)={0x0, 0xc8}, 0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0xa) rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffe]}, 0x0, 0x8) timer_settime(0x0, 0x5, 0x0, 0x0) r9 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x42f82, 0x0) ioctl$SNDCTL_DSP_SPEED(r9, 0xc0045002, &(0x7f0000000180)) mount_setattr(r8, 0x0, 0x100, 0x0, 0x0) write$dsp(r9, &(0x7f00000001c0)="5cba91a4", 0xffffffd9) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) 10.562157343s ago: executing program 0 (id=1546): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000440000004400000004000000000000000200000d0000000003008000000000000000000000000000020000000100000f03000000010002000200000002000000a77818000000006400000f010000"], 0x0, 0x60, 0x0, 0x1, 0x0, 0x0, @void, @value}, 0x28) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x8002) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2000001, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f000075d000/0x3000)=nil, 0x3000, 0x0, 0x7, 0x0) r0 = userfaultfd(0x801) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x400000bce) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x161281, 0x0) r3 = syz_open_pts(r2, 0x0) dup3(r3, r2, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000040)=0x6c70) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f0000000100)=0x300) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) socket$kcm(0x10, 0x2, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) read$FUSE(r4, &(0x7f0000002180)={0x2020}, 0x2020) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600700, 0x19) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 10.316301764s ago: executing program 0 (id=1550): r0 = syz_open_dev$dri(&(0x7f0000000080), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_RMFB(r0, 0xc00464af, &(0x7f0000000040)) r1 = socket$kcm(0x10, 0x2, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) syz_open_procfs(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) connect$inet6(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pressure(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x2d) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000100)={@dev, 0x0, 0x2}, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r7, 0x400452c8, &(0x7f0000000100)) truncate(0x0, 0xc00) mount$9p_fd(0x0, &(0x7f0000000100)='.\x00', 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400001e00810ce00f80ecdb4cb9f207c804a00d000000010006fb0a0002000a0ada1b40d80500c500c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) fsopen(&(0x7f0000000000)='tmpfs\x00', 0x0) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/zoneinfo\x00', 0x0, 0x0) read$FUSE(r8, &(0x7f0000002880)={0x2020}, 0x2020) 10.315234068s ago: executing program 4 (id=1551): r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback, 0xfffffffc}, 0x1c) listen(r0, 0x20000005) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x6, @empty}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x800) socket$inet6(0x10, 0x2, 0x0) r3 = syz_open_procfs(0x0, 0x0) getdents64(r3, &(0x7f0000000100)=""/4014, 0xfae) write$P9_RSYMLINK(r3, &(0x7f0000000000)={0x14, 0x11, 0x1, {0x8, 0x4, 0x8}}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r5}, 0x18) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r6, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0}) sendmmsg(r8, 0x0, 0x0, 0x0) sendmmsg$inet6(r2, &(0x7f00000001c0)=[{{0x0, 0x9b4c, 0x0}}], 0x500, 0x0) close(r1) 10.197225331s ago: executing program 3 (id=1552): ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000380)={0x0, 0x0}) prlimit64(r1, 0xe, &(0x7f0000000340)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) flistxattr(r0, 0x0, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r5, 0x4020565a, &(0x7f0000000300)={0x5, 0xfffffffa, 0x1}) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg$inet(r0, &(0x7f0000004bc0)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000f00)="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", 0x106}], 0x1}}, {{0x0, 0x5e, &(0x7f0000000b40)=[{&(0x7f0000000700)="acc841985992b79554acfc02163bb0fb2bb293e68702bb40b6b870bde5700d3687", 0x21}, {&(0x7f0000000740)="b1f56ee29c433328d3b2a83bd97e37007087acae7568edff43ed556d76770122635aea1dc4875538", 0x28}], 0x2}}, {{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000b80)="1ee88f78de7d57006d8ffa3f1d92c228a43f6c86558705d98691e6344fa3745cc92c1f80fc01a77c28bb77872fc4f9be9660bb62708d0f52f4958fb4cc5144775062cc", 0x43}, {&(0x7f0000001bc0)="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", 0x1de}, {&(0x7f0000000500)="06471fce6a013314db732e50a88f4240c52f94895b3c8039da799e1ce9a79dc830bf11a20dc70885b6398ef975910a04d84b544a61d73be2c4b0ddcb77d70cfa7a57a6d9459b16a78716edd9e7bad238", 0x50}, {&(0x7f0000000580)="e96aa14ff75134eb85c028e54cfe33a07526570fdb14c4e9a06e4e134ce4028ae0bb1ea16e99d00fe4631c8a7be319b33c20c718c43475c41f5e361bf905fa278bf6b9198339ce693cfd7733f87b878ea1da302b346d12cf9c4f4e9b8817d5fe3e8e85a0c74f90b89beaecd8b9611158f0aa8599bab123b8c971a5e2aba5ccef5822b491fcf17dac0d4cc248e1e8a1ad12651b9191978f4122dd5cd76bc68fe30d6274a0722decf624648905122446ba8ed4087dc693018df2ce881e49fe0025a1503bbf5df2", 0xc6}, {&(0x7f0000000780)="1a3433e1184fb319105aa87a96d02355d5523aff56957ae813956b361eef8fcbfe462cdc9863a6dbde1622afa0b30b1ca96488575583eb8ef875a044887b19c7eba9819fe626999d1122", 0x4a}, {&(0x7f0000000880)="21201334223d42e1de8debdc4ce0016855006053ad999b1b9f086a1e00000000000000000000008aeeea0a1421f969a63ab62e50162f18d51c15d413e15dab9a111c10aa83c6", 0x24}, {&(0x7f00000002c0)="5437880c521fae1199835972743545c27438221c36ee193063856728e8", 0x1d}], 0x7}}], 0x3, 0x840) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x11, 0x0, 0x27) 9.348967933s ago: executing program 4 (id=1554): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008bd6000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000023"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_usb_connect(0x0, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="12010000cbc4d02008160c03963c010203010902240001000410000904a510022ee9190809050602ff0300000009058216"], 0x0) 9.346591593s ago: executing program 0 (id=1555): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x280000b, 0x28011, 0xffffffffffffffff, 0x0) r2 = dup(r1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)={'#! ', './file0'}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) r5 = socket$rxrpc(0x21, 0x2, 0xa) syz_emit_ethernet(0x7a, &(0x7f0000000180)=ANY=[@ANYRESOCT=r2], 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYRES8=r3], 0x2c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYRES32=r5, @ANYRES16=r8, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r8], 0x4}}, 0x0) sendfile(r7, r6, 0x0, 0x100000002) unshare(0x62040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b000000000000000000000000030000000023b5000000000001"]}, 0x99) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) write$cgroup_subtree(r10, &(0x7f0000000080)=ANY=[], 0x10448) landlock_create_ruleset(&(0x7f0000000000)={0x200, 0x3, 0x1}, 0x18, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r10, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r9, 0x0, 0x81, &(0x7f0000000040)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, 0x0, 0x0, [{}]}, 0x88) sendto$l2tp(0xffffffffffffffff, &(0x7f0000000040)="e5786a0d000000000000c8", 0xb, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) 8.676055935s ago: executing program 4 (id=1556): openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x8002) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000000080)=@framed={{}, [@ldst={0x3, 0x0, 0x3, 0x1, 0x0, 0x86}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000840)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = getpid() r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f00000008c0)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xa9, &(0x7f0000000180)=""/169, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='net_dev_start_xmit\x00', r5}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r4, r6, 0x0, 0x46, &(0x7f0000000240)='t\xa1\xb7c\x84\x04\x00\x00\x00\x00\x00\x00\x00\n\xf9E;\xee\x05\x008H\xfb#\a\x00\x00\x00\x12R\x853\xd6\xcf\x8e\xe6\x19m\xcaU-\xfb-E/\xfe\xb6n\x01l\x9e\x02\xbf\xf8\xa3-AL\xbb\xcb\x00k\x00\x00\x00\x00\x00\x00\x00\x00'}, 0x30) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340), 0xfffffffffffffe19, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x42) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ee5000/0x1000)=nil, 0x1000) munlock(&(0x7f0000f4b000/0x2000)=nil, 0x2000) mremap(&(0x7f0000e1b000/0x4000)=nil, 0x4000, 0x4000, 0x7, &(0x7f0000f2b000/0x4000)=nil) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001300)=ANY=[@ANYBLOB="240000001200010000000000000000000a80"], 0x24}}, 0x0) munlockall() setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200)=r7, 0x4) 8.248794856s ago: executing program 3 (id=1558): bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x240490d4}, 0x40010) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x87}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x6) kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) r0 = getpid() rt_sigsuspend(0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000f80)=@newtaction={0x18, 0x30, 0x9e54f29ff072a93b, 0x0, 0x0, {}, [{0x4}]}, 0x18}}, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000080), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r4, 0x4010640d, &(0x7f0000000000)={0x3, 0x2}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r4, 0xc01064b5, &(0x7f0000000140)={&(0x7f0000000100)=[0x0], 0x1}) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r4, 0xc02064b9, &(0x7f0000000040)={&(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200), 0x4b, r5}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r6 = syz_open_dev$vim2m(&(0x7f00000001c0), 0x3, 0x2) ioctl$vim2m_VIDIOC_ENUM_FRAMESIZES(r6, 0xc02c564a, &(0x7f0000000200)={0x2, 0xb5315241, 0x2, @stepwise={0xe0, 0x81, 0x7, 0x4, 0x6, 0xe66}}) bpf$MAP_CREATE(0x0, 0x0, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r7 = syz_open_dev$cec(&(0x7f0000000100), 0x0, 0x0) ioctl$CEC_TRANSMIT(r7, 0xc0386105, &(0x7f0000000440)={0xfff, 0x0, 0x4, 0x0, 0x0, 0x4063, "57c1169b6664ea61326ac71ae7213059", 0xb5, 0x0, 0xfd}) 7.857443473s ago: executing program 0 (id=1559): socket$nl_route(0x10, 0x3, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="000088caffaaaaaaaaaa0086dd608a6d55000800fffe800000000000000000000000000000fe80000000000072bc0000007960f8f7aae0ff000000575fbd9603dd9ccfc4d6cf3cfb3e090b484cfbd36eed1357537f968f8f026d19daf3240e40bc9aa11e4903ca366931bc72a0a475d7867754b7c8e0ac84c197ebbeea4cad728caa2d8d73e047ac206bec426b11b7cef0a6ba06b5e191f89e629cf782f62f52f789e0d75403cf91f8baee453ce729614cf19b04bd87dbf69cc66f256eb6d0b107a044bc9b3d9346b26dd51b8c4912dbd410dc7645bb82afd214538e7179b57e38bd5fb3e26c88"], 0x42) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket(0x2, 0x80000, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@gettaction={0x18, 0x5a, 0x1, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x4}]}, 0x18}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0}) pwritev2(r0, &(0x7f0000000140)=[{&(0x7f0000000780)="480152754e486dad5f539f585154c4c6d67386a71c3cc94700e616fba17c4b1741a613012847acf66f32f262e2cd39a812e344f18dc7cf475260c79264f83f0f8666fe2824bd94817d933ee8a69e06012f7bc4d6fa9779a0c386ee3df9029649359ce81e5a3a39d9f9e2451936b62e1f", 0x70}, {&(0x7f0000000ac0)="8b7339987f6bf94c9cd313b0558ba29d529afe599257eada633c556d070e024d9eabad208182198be9af87e11c4a167a0564c0aacc0e6ae9a83230e80a583cd09bfb2676c6a26ff5ef33fe15b521bdf6512e5ea5f97ffc1feadc01dc34f0acc5216447dfbae2fff522902c9fc4daf1bc73004f654466b5d016d914c003b48de32510f053439d5e0b9e7a7d8a4253607f9f0661c05bc5f42cc7014d7bf16d38065b575848bc49f4dc540812e0b5b5c44c3f838830c2db534725338cc4826adbcd4ac8a3955c39c997a664293101a9d7f4a2ffe1e34d9a59bbe1f2ca422875287113d30a15126e4a25d37290d6d2c2bfd58631c0b6836198caac48dccf08b794876df5fdc1b311163ea404e22c182b9f3d7666ef493d09d45e524828dcddec3000ec36a07fa6460368bfa62ed2217614f5a76a164d0e6f37aff2bd7924971a57921f2dba200e80c302128fcac114794f47e33d134392d47a7d4b999e456d947f92fbb6bebe255436a7cd95dbb012efff9d76963ec0b4bf2f6035b95a2b59bcfde30d9aa243af828d7670366f66a68ae1362cb4159ce32db338cb795071954209551a5df69d3c370b4a43ffe3a1bb234ec11d35e56ff7136d4f6399cdeb50b616164bb1ac7ca4da5835329f576a5e5003de3a8106e5486c57b32c5320df7a03b1fe23974851b741a1423920583a8a2ac89ec05c40b875660ea377273757ad454966f2c2fb07b76978946b2994f410aecb96b0b5a2f331e5037921723e8a3ffc7090ca3d35369c9dd167c34a87386244ea5925a9cb22fd3985ec0f5dad2f029c3aeaf03ee4b610945d74a8f553c259330275ec5967931af0c5dd39c9beea6d82b1dabb1cd693ae8b2116515f49f3d00f31d12df90f51150f2f9ae42202e3be143c9d4823b6bf42cd4b190fbc9b77766f370248cd456f51196b35a9a01e79bee35b7c31532bdc3e5323a36cc98f059352385b847802ef1d3856f52645db179267e86f266515a052f60990e0903992c6417289169a17f1e359aa6f0e475f5a1fec3328ee2bd44982a678f52daade6333da8351058557a416ac6e6943879b4aa8c33024f518a5fd02694262ac8908ec0d719288ea7af3bde20bb09dc8f7ee165eec7c155f534bfe2dfa7caade4aa3403416f01290ac2183d0f558b25a8d8cb0ad8ab6fe2d2fbedd91485f585ea0347ff2c172c11cb1f56718a95e0abc84c45b79eebb706aea1b1aa4302f6ae11bf5d6150cbf2741ab66139c83ea735e793b27df01101d08ce79b6971978ee4112f52359d20ae3075f70c42f7a7d3dd688e03292cd02573003ee54ef151c7dc4736233f30d2b3eba4596bdb1b9d06f3c0a0efc9912e533114337274453df238a02f5ed0691055f066425c95f81573f4a3bbb924ec3258024b9ddc67370d01aa57ead06e5002260dd04c7b87736df446f7d1c73a63c309eaefb2394dc21f6b2682628576df7854e59da889c1170b9a6fc797558a22388dd3a96f797973b40e33c1f624d6762cbb7966538936b85ada8feff291d44e51514a9d8fdd9c5723791d3b3c817da7528775b6de834449febd78096f7e1c53b27648417b8acd1903eca335078d40a45846b260dde4cffa8aa51dc20a634d3869d8a6576e202b06debadbee6b19d6bca5a35c7d3f077f01d05874cee42f7bf94bdfa22eb1581598cee25322a4a3a669443efb197960845b5f25646825dcfb6a4e8e75b90d84548d2cf21ce86fedf0ccbe4122d20944c3773edc4458ce5b302432e4e82bc246897aa9b66fce5b2320286c66e4e69282fe0dea579bbc4f76ce9407d54b308e0060b9bda4b0dfe83afc5de97b416b0ea40cc32171df7443ebbbf5666abb46e7bda931b009936350b3b9a15ad9e775187daf142aa4f2b9c7982399b8bb9e26bafbb39e37adb53dc635df7c8371a99017d148534db7b196ffd71db0b991e8f016beb9d870298608882045257c412df77d59bb7822d06c22267d7c1875ae3be710b0b467c52899b8060db4bc3982d3687fab3f70920453a4b975f2822c9876586b181bf4f766427806e34b83256daab18532d2bb896abaaf685c4282105add9ccb23a397520d4713c5973dc75cc2992c1a375c832462e9b0aaddde11ce8ede1a7d72c65b0622fd63baf3f860c2736adf38153e214e871eedd17440004def7713cbe1845fd5c6aed1ef7eb7a157e37994ac591bfdc0a16561cfa1cc2aa12a8f84dd82f94ac56a11fec32454cc4b56d10da38da5cea5a4bd5f2c75affc095d1585518fa4ac15d50cdd8a25e835bfb68bda92427f21927ea586f5009992866e515bd9559367ce644a241c66b686059f3f9189d7d5b572dfe12d5e12528da34fea8d60f6dd6f8666a25256fce398c3ef149f7057690f4255189c59da5c060d842053460bf252f9bf4f8036371d5519925f54ebaf621ab26f6fa1f613470e096daf164c525bd6982cafc23cb9009ac8d2cbab718b1e3e4c6fcf518712cfa790031a075c454e3b3e005154ca819a83c52b0c1d11ec7496b37ae1e19326fd343074921c275dae0d1391a9b39177ed943f38f8f084503ce3753a3ec4beead9062fcdac8728f0e648efdd99d55fc07e8a7bd40c98c9a0fa382709c2e059f34887a12382a3543cf85f75056308825cae1c52fe33b8184f8d9f03b1914c5458b9e00b0af709eb02fc2cc6435e8db1f16e730dd7d9600fd628c4d99dd89e0fc86c1cf0b0d6274f331985cf164331d117c3ad579ac5030b001af814791079fa7a869c446205df8b33e5a0bcf782eec22956df87a72448348e5f301aab463f6743e7c6f7029266139587d2343877f7d24b48b35f37551c6ff7ca7eb6f45ec63fa8d1764904c9ec6c35f2e366e617d55f3bcf092a636b89b28bc5e04f91b50acacd03c71c4b8367353de17bfd05f2f8d4eeba2291db26175f0a093767ce41121fe409fdff0cd5b41437f78ee0cc4e046bfca235c8c8f9b6ce85741aabd99e34a33de23d1959ee7a0b900bf05b147d7de442540afb0c02cab8825e36d693f3448cc25cebfbca120f99ac9f5365a28370cb0bfa11d384af9362f6f0ccde3bb52e3f8e2c1f9d9d5ca6e30910ee2efb9c9bb25494a773c1ce79a4f4f1bf2a7c657fb78103dcfa6d201692bfbc30dd2156aa9fd2a04652c04ca8120a55882f528e77ef5bbbdd3dd902fd9dc7e62da454cf62a61dd9fd5626941c4de94afab22555d61a24c8fc0349b4c6133d6750e56956a5c3234195556d943a33d53545387f7271afbb41cc8d5ac6b185b4eebf9f8f11eb31d8122d596ba06f06975893eb6cb7f91c1becc38030f17269aae0a15417807dcb207ed2d0cab8474f326633eeb01dd5173b943248e2d0460c1cc0b22afd2e58c64db1a768156700667036cf7b4cf60094e186947f9d282a28669f71d8805794bc6a668c24f4ca965fd680149d9477326ba40229df700bc884593fe0aa680104eeae0897e39a261657dd3147f7e1ebe68f0aec45db066512a6ad5476c49d74e7cc65ad66cb3e253866104ebfe26e6daaf359c2bb4149da27ab1e272bcb7de040694dcec9a5073902d3b68ccfbb7cf2df3b023acabe3c5de35f576f0a00f56736edddd22096d84ccfd62e358bc9f5d3411049cf96076b3d2f6e2975f24cbb5e349b068ac973a192fb3fe4f4f96ad5ce893f29af092febd1b4048e698cdc53648a3454df3bfae55d617a3429a7a5b2ddc026ac96c7d79aa7248d4215cd2a06857d00e634ce95a47c82d1c1fd0043d007e925ca04dde2fb7c9c4e47ec23c57e35caef5f04287fa5b4873431adf73019927778c6686598faa8dece575570d0db98d32f0dd9daf2c936da5e0873ebba38aca432c0eb11f1d21431b653dd8c5c755fc038e305e741ddc12da504d42b0ac7d201ba1941a930dd3dbed4f573b46275ef28b6fd6ba63fe0dd4d2eabdaf557809c2fde855d6c56f1be2c0bf4a4abbb5808a533cfb9ae8c7cb602e84116998676752ec7f1badc9db6eedf7f825f02ad20a06323c090126644134f29c3a19554cb233d8056d3b8a276af30c32602995e3a3874970917053fc4081fad5f891bb232397ebf0d50d275bfbb60aee1950f010c5890e36841fc257bc4db09c2974e4c9c78352842a2c2195c660237b0818c9f65cb49c137f75e49836a732396ebc7907d6751d6dc12945961282e3214d2f21ec0976d97f79939205141f801249b4430feb0b01ec33012bdc31f32e71eba9ed8d89162f1f478533758e27ab1ed1358d94275f4b1cf7785847a07e9943486acbb526c9e6c2095769dfb739d95651a0148d9a84accc9173b164bb961966e8c756d58958acdd72d41068d1806094d3cac9d974e87a0100594a4f18f6ca03cb7db26fb5e31847568861ab2ff44ffce4231711acb93ccf67be16c307bbe5d40ef7d13351b9c8b5f2088cfdb8972f74fe5ce0641097386c1c3c5318da757671c599a111979275c913de7aac27f818ed46d6f04e45d78eaa2fe4967529b33048fb4d4099ac1133ba31c2673bc5795e72ca9ec626deefa636031274a1b476f019d23c82af507aba6b6180d89b6d292625bbc88a4ec80be0a2ebf70d3c775cf4a26f1b55ac66bb1965381d5c72a45e104d41f0e7ed0b1b73cf6c25b4ea3f520c2ae00e8c71f1d6543b5e7e73b39013c1b323bb6c64dd9d554d4862e6146ca31f4ead5eaece1bcd748a6940a045d16076a0a4a36be0a0cd85ba8f91f132abece69d6c98911ed67776ab6075762761f34617467c2a2f8fd185ac61e99534871c44a7372b4a750437291289cbbd2497daa5a3846370dbf54ea11d8bb778a7e0785679bfba1160ef63d3330705041f7809fa87da5d00086384119077dcbae99a1ef13dde71a8fa55771398ac5549d7aa1b506b62509af2cd8517a1f6bbe9d12ed1abbf9b60826aad286038a6570eb522ae4be9ab8d5fa5473c6b907888dcd35177183f76acd850d8d64264c2ae4eca8a27f81d1753e41d2fb940449159b222d3c8d918660be743a2a72ef24551bdeb92728c7ae75a1663e60f431565a415853673350fe344a875dab61dcee1da67fb33edb66803f16d99d91dbaa88c951dd23800d2624a9230f4f6cfeccc40c3077f59560ab7d2fa2db97e21936e24b8bd17a6fb378f82113250f876938f03cac84d6e607395484cb8e5fab103ba863b2f79bab1408e6bda39f933a22c14f19c1f4928400c2a44899386496a65d48c52551c15430cc6058dcdb6ec7bcb6718d888e9ddea1bd561f58254b491477b56c319519390f05e623384ecac953a09aa83b9a1695d46a91c7bc49201e5947d75f970e92b991f11824c9ef737bc067f6ef33503cc6a655e1566fa1d27678171485823777ebb6ff46b57ed912e63747106f995789c313aa4b72c31c63348de3204baf27262838b5eb7690a67dea17aa4963e3f82af5c99f1d76e937080bb5809c6ee17df5728902683589dd455f382f2c5e908c230484e145231803c0f699f59f1f5ad46d26681ebc55f6b1f8fd25df2ed976c4d2b68ae5a4bef750fee4ec4dbf1eade35f18daf20f3f61ad4b36e3c6dfb278001da3052e431d6badac6b85dbca5e3cecb360edd79c3d5a86afec015c6490379b6105c5a52422fbd5d8771282c51ae0c0f0521915200ac6a878cdda4d04614e7b12b393375c2d20e7a3a4db3c6c1222b991ac0d706642edcb4f6d4199c837919e9f22620fa6f8355017b494d7d5b28ddcf22bda843d0be6050953bff2dc7922fcd93ce26d145064aba1646056a2df0cac34947f1d6053996deee9381848a13701520ae6c36ec170f51a34931f32d721291fa", 0x1000}, {&(0x7f00000001c0)="9eafbe6c47c21f1ab714b8a1075046", 0xf}, {&(0x7f0000000800)="75cc8d9637134c780cdb8a0a61b41f3a7522e43e5ce5aaafe040b95ee16846dcc2512ed2e8c396021da3c06077919ff36450c50b1da5b559e51223a7f6b2126190f4f16d17c80218f9b801ac929d7662cab1aab3859d7fac63282241c6b073f18e268c912e397f06", 0x68}, {&(0x7f0000000880)="47ebdd637580b6d41a002cf61afb7b7078b7d99eb991643890982a0b758da1626bc79e4ffccc411c6661a462e16c53d927ea1c8ff8b4251e5ca8a5eed8962e2cffec26883d39417d46b16555e311bab93d930939531214e1dcb656f1e1e3c25e832d8805caf2f64f5050afeee691342190f10e52cacc97c48311f67efafd9bae40c0ef838a0e470daac89fe76376defc5f26b27599cde5d3c8346872da8b365c7745b2ff66f9a43001073d0ce1f0a80dc5af", 0xb2}], 0x5, 0xa4, 0x7fff, 0x2) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r4, @ANYBLOB="22003300d0000000ffffffffffffffffffffffff50505050505000000404000000000000ee97f4fb4344c661145144da1acb15cc323263a99a9ad24c733be6b77c1255f0e5edbfe19899f489fc4f89193dec78cd87f23f32675a3a78d5fecb76272fcb1bae0bb10400000000000000d06cd55048d7"], 0x40}}, 0x0) r5 = io_uring_setup(0x17c7, &(0x7f00000002c0)={0x0, 0xf884, 0x40, 0x0, 0x4000}) r6 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r6, &(0x7f0000000000)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x24) listen(r6, 0x4) recvmmsg(r6, &(0x7f00000050c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close_range(r5, 0xffffffffffffffff, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x9) r7 = socket$inet_mptcp(0x2, 0x1, 0x106) sendmmsg(r7, &(0x7f0000002840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000000) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e22, @remote}, 0x10) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f00000002c0), 0xffffffffffffffff) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000880)={'bridge_slave_0\x00', 0x0}) r10 = socket$netlink(0x10, 0x3, 0x5) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=ANY=[@ANYRES8=r7, @ANYRES32=r9, @ANYBLOB="e04f00000a000200aaaaaaaaaa0c", @ANYRES16=r3], 0x28}}, 0x0) 7.809130274s ago: executing program 0 (id=1560): openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x8002) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000000080)=@framed={{}, [@ldst={0x3, 0x0, 0x3, 0x1, 0x0, 0x86}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000840)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = getpid() r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f00000008c0)=ANY=[@ANYBLOB], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xa9, &(0x7f0000000180)=""/169, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='net_dev_start_xmit\x00', r5}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r4, r6, 0x0, 0x46, &(0x7f0000000240)='t\xa1\xb7c\x84\x04\x00\x00\x00\x00\x00\x00\x00\n\xf9E;\xee\x05\x008H\xfb#\a\x00\x00\x00\x12R\x853\xd6\xcf\x8e\xe6\x19m\xcaU-\xfb-E/\xfe\xb6n\x01l\x9e\x02\xbf\xf8\xa3-AL\xbb\xcb\x00k\x00\x00\x00\x00\x00\x00\x00\x00'}, 0x30) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340), 0xfffffffffffffe19, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x42) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ee5000/0x1000)=nil, 0x1000) munlock(&(0x7f0000f4b000/0x2000)=nil, 0x2000) mremap(&(0x7f0000e1b000/0x4000)=nil, 0x4000, 0x4000, 0x7, &(0x7f0000f2b000/0x4000)=nil) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001300)=ANY=[@ANYBLOB="240000001200010000000000000000000a80"], 0x24}}, 0x0) munlockall() setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200)=r7, 0x4) 7.268938646s ago: executing program 3 (id=1562): syz_open_dev$vbi(0x0, 0x3, 0x2) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x100008b}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x121301, 0x0) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{0x0}, {&(0x7f0000000280)="e1", 0x1}], 0x2, 0x0, 0x0, 0x1f00c00e}, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x8e) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x400000bce) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x1) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet6_sctp(0xa, 0x1, 0x84) r3 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x0) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000000)={0x1, 0x60, 0x0}) 2.825869101s ago: executing program 4 (id=1563): ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000340)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r3, 0x4020565a, &(0x7f0000000300)={0x5, 0xfffffffa, 0x1}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x11, 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x801, 0x0) 2.501306531s ago: executing program 2 (id=1566): openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100), 0x3f00, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_usb_connect(0x0, 0x24, &(0x7f0000000140)={{0x12, 0x1, 0x0, 0x1e, 0xe9, 0xda, 0x8, 0x10c4, 0x818a, 0x1837, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3}}]}}]}}, 0x0) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000), 0x402, 0x0) r3 = dup(r2) write$6lowpan_enable(r3, &(0x7f0000000000)='0', 0xfffffd2c) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x3}}, 0x10) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/crypto\x00', 0x0, 0x0) lseek(r4, 0x1000000, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x200) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000380)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000780)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xeffffdff, 0x0, [{0x0, 0x0, 0x0, '\x00', 0x8}, {0x0, 0x6, 0x0, '\x00', 0xff}, {0x0, 0x12}, {}, {}, {0x0, 0x0, 0x4}, {}, {}, {}, {0x0, 0x4, 0x8, '\x00', 0x1}, {0x0, 0x40}, {}, {0x0, 0x9b, 0x2}, {}, {0x0, 0x0, 0x6}, {0x0, 0x0, 0x0, '\x00', 0x1}, {}, {0xe, 0x0, 0x6}, {}, {0x0, 0x4}, {0x0, 0x4}, {0x0, 0x40, 0x9}, {0x0, 0x6, 0x0, '\x00', 0x8}]}}) 1.8718111s ago: executing program 2 (id=1567): creat(&(0x7f0000000040)='./file0\x00', 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1000, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x101001, 0x0) chdir(0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x77, 0x101301) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4001, 0x3, 0x458, 0x300, 0xb, 0x148, 0x0, 0x148, 0x3c0, 0x230, 0x242, 0x3c0, 0x215, 0x3, 0x0, {[{{@ip={@local, @remote, 0x0, 0x0, 'batadv_slave_0\x00', 'macvtap0\x00'}, 0x0, 0x2d0, 0x300, 0x0, {0xff0f000000000000}, [@common=@unspec=@cluster={{0x30}, {0xa0000000}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0xe, 0x0, 0x6, './file0\x00'}}]}, @common=@inet=@SET2={0x30}}, {{@uncond, 0xec010000, 0xa0, 0xc0, 0x0, {}, [@common=@ah={{0x30}}]}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x4b8) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="cf9a899ef817a71c09fc1b5ba1180000000000000000000000000000009500390000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) r6 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f0000000b00)=@raw={'raw\x00', 0x8, 0x3, 0x428, 0xd0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x358, 0xffffffff, 0xffffffff, 0x358, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00'}, 0x0, 0x258, 0x288, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x488) sendmsg(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x2c}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r7 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r7, 0xc1004110, &(0x7f0000000040)={0x0, [0x2, 0xfdb, 0x5], [{0x3, 0x0, 0x0, 0x0, 0x1}, {0xa, 0x0, 0x0, 0x1}, {0x0, 0x9}, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x12, 0x6}, {0x0, 0x81}, {0x6, 0xffeffffe}, {0xbe12}, {0x9, 0xfffffffc}, {0x80001}], 0x21}) creat(&(0x7f0000000000)='./bus\x00', 0x0) mount(&(0x7f0000000340)=@filename='\x00', &(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000040)='&@,,') openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 1.688347506s ago: executing program 2 (id=1568): r0 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r0, &(0x7f0000000c80), 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="2400000020000100fefff1c321e800000a00000000000008120000000500130000000000"], 0x24}, 0x1, 0x0, 0x0, 0x24046040}, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {r1}}, '.\x00'}) r4 = syz_init_net_socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r4, 0x12, 0x2, 0x0, &(0x7f0000000080)) rseq(&(0x7f00000004c0), 0x20, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f00000000c0)={0x0, 0x989680}, 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f0000000040)=0x1d) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xc, &(0x7f0000000240)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={r5, 0xa49a, 0x30}, 0xc) 1.516389478s ago: executing program 2 (id=1569): syz_usb_control_io(0xffffffffffffffff, &(0x7f0000000000)={0x2c, &(0x7f0000000080)={0x0, 0x21, 0x100, {0x100, 0x22, "b22f0dbdf4dda35c02ff6984e96eb6409f0a05504567c5d051b093140e33a7ad69e832c553c338c3f1589e0d7fd1833227da71dea50721e1c4c3b04cf1d9096ba92aa8ca7f186030243e4914e7011dd4ece9348d8e92d2fed576ee81b4941c817f16e4ef49b87dbba90211b2e154f662467e0e910e1dee23f9bc9e347329b798fc7cc2c3cf4f1485bd62e60e26e843a34c86b1fdf2f4f1869e057128719ec8f0b6cfc5221a0140a9494876ee8289ac060b4a0cac9f73ee417b9f503ea1ff39da91aacb41d1438e94489f30d3ecd536e4788fd93ea5d1123db3c6714190959d79c57f5fbfb097a256e86d7c3578f76a1a28b7e6a3c5bb89b9223c0d8972e5"}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={0x0, 0x130}}, 0x0) 1.442159619s ago: executing program 4 (id=1570): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000240)={'wpan0\x00', 0x0}) sendmsg$IEEE802154_LLSEC_SETPARAMS(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x24, r3, 0x1, 0x70bd2d, 0x25dfdbfb, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r5}, @IEEE802154_ATTR_LLSEC_ENABLED={0x5, 0x29, 0x81}]}, 0x24}}, 0x0) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), r2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x1, 0x7fff0000}]}) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/stat\x00', 0x0, 0x0) lseek(r7, 0xa3b, 0x0) r8 = getpgrp(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) r10 = getpid() r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r11, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r11, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x24, r12, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r13}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r11, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x30, r12, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r13}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}]]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_GET_MPP(r11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)={0x28, r12, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r13}, @void}}, [@NL80211_ATTR_MAC={0xa}]}, 0x28}}, 0x0) process_vm_readv(r10, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) r14 = openat$hwrng(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) fremovexattr(r14, &(0x7f0000000080)=@known='system.posix_acl_default\x00') openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140), 0x40201, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x58, r6, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@NL802154_ATTR_PID={0x8, 0x1c, r8}, @NL802154_ATTR_PID={0x8, 0x1c, r9}, @NL802154_ATTR_PID={0x8, 0x1c, 0xffffffffffffffff}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_PID={0x8, 0x1c, r10}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r14}]}, 0x58}, 0x1, 0x0, 0x0, 0x40000}, 0x20) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) r15 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r15, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=@newspdinfo={0x24, 0x24, 0x4, 0x70bd26, 0x25dfdbfc, 0x0, [@XFRMA_SPD_IPV4_HTHRESH={0x6}, @XFRMA_SPD_IPV6_HTHRESH={0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x8080}, 0x24008000) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) 886.304374ms ago: executing program 2 (id=1571): bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x240490d4}, 0x40010) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x87}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x6) kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) r0 = getpid() rt_sigsuspend(0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000f80)=@newtaction={0x18, 0x30, 0x9e54f29ff072a93b, 0x0, 0x0, {}, [{0x4}]}, 0x18}}, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000080), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r4, 0x4010640d, &(0x7f0000000000)={0x3, 0x2}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r4, 0xc01064b5, &(0x7f0000000140)={&(0x7f0000000100)=[0x0], 0x1}) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r4, 0xc02064b9, &(0x7f0000000040)={&(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200), 0x4b, r5}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r6 = syz_open_dev$vim2m(&(0x7f00000001c0), 0x3, 0x2) ioctl$vim2m_VIDIOC_ENUM_FRAMESIZES(r6, 0xc02c564a, &(0x7f0000000200)={0x2, 0xb5315241, 0x2, @stepwise={0xe0, 0x81, 0x7, 0x4, 0x6, 0xe66}}) bpf$MAP_CREATE(0x0, 0x0, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r7 = syz_open_dev$cec(&(0x7f0000000100), 0x0, 0x0) ioctl$CEC_TRANSMIT(r7, 0xc0386105, &(0x7f0000000440)={0xfff, 0x0, 0x4, 0x0, 0x0, 0x4063, "57c1169b6664ea61326ac71ae7213059", 0xb5, 0x0, 0xfd}) 883.447631ms ago: executing program 4 (id=1572): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket(0x8, 0x80800, 0x4) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) openat$vimc1(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000bce) r4 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r4, &(0x7f0000019680)=""/102392, 0x18ff8) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000000)=ANY=[@ANYBLOB="5c0000001000090400"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000028001280090001007665746800000000180002801400010000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000a000100aaaaaaaaaabb0000080004"], 0x5c}}, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4808000010001fff3a4ee9bfd5c3a3696c40af0b", @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800a00010076786c616e"], 0x3}}, 0x0) write$binfmt_misc(r6, &(0x7f0000000000), 0xfffffecc) splice(r5, 0x0, r7, 0x0, 0x4ffe2, 0x0) ioctl$SNDCTL_DSP_SYNC(r6, 0x5001, 0x0) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="5ac45e1d", @ANYRES16=r2, @ANYBLOB="010000000000000000003900000008000300", @ANYRES32=r3, @ANYBLOB="1c005a8018000380140005000800090000fe0300fbff00fe0000ae00"], 0x38}, 0x1, 0x0, 0x0, 0x40080}, 0x20008840) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x20, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x48}}, 0x0) 0s ago: executing program 2 (id=1573): socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x420000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) syz_init_net_socket$rose(0xb, 0x5, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sys_enter\x00', r5}, 0x10) quotactl_fd$Q_GETFMT(0xffffffffffffffff, 0xffffffff80000402, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x15, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="720aacff0000000071101d000000000095"], &(0x7f0000000480)='GPL\x00', 0x40, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd824498949714ffaac8a6f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb5447000001000000008f2b9000f22425e4097ed62cbc891061017cfa6fa26fa7088c60897d4a6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe6b1b8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3540546bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) kernel console output (not intermixed with test programs): ] ? selinux_netlbl_socket_setsockopt+0x184/0x470 [ 298.669994][T10191] ? __pfx_selinux_netlbl_socket_setsockopt+0x10/0x10 [ 298.676776][T10191] ip_setsockopt+0x59/0xf0 [ 298.681230][T10191] udp_setsockopt+0x7d/0xd0 [ 298.685749][T10191] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 298.691655][T10191] do_sock_setsockopt+0x222/0x480 [ 298.696692][T10191] ? __pfx_do_sock_setsockopt+0x10/0x10 [ 298.702241][T10191] ? fdget+0x176/0x210 [ 298.706310][T10191] __sys_setsockopt+0x1a4/0x270 [ 298.711151][T10191] ? __pfx___sys_setsockopt+0x10/0x10 [ 298.716509][T10191] ? fput+0x30/0x390 [ 298.720393][T10191] ? ksys_write+0x1ad/0x260 [ 298.724886][T10191] ? __pfx_ksys_write+0x10/0x10 [ 298.729729][T10191] __x64_sys_setsockopt+0xbd/0x160 [ 298.734826][T10191] ? do_syscall_64+0x91/0x250 [ 298.739486][T10191] ? lockdep_hardirqs_on+0x7c/0x110 [ 298.744673][T10191] do_syscall_64+0xcd/0x250 [ 298.749162][T10191] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 298.755044][T10191] RIP: 0033:0x7fdc0c17e719 [ 298.759443][T10191] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 298.779036][T10191] RSP: 002b:00007fdc0cf13038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 298.787434][T10191] RAX: ffffffffffffffda RBX: 00007fdc0c335f80 RCX: 00007fdc0c17e719 [ 298.795998][T10191] RDX: 0000000000000029 RSI: 0000000000000000 RDI: 0000000000000003 [ 298.803969][T10191] RBP: 00007fdc0cf13090 R08: 0000000000000014 R09: 0000000000000000 [ 298.811922][T10191] R10: 0000000020000080 R11: 0000000000000246 R12: 0000000000000001 [ 298.819879][T10191] R13: 0000000000000000 R14: 00007fdc0c335f80 R15: 00007ffc9fc4f098 [ 298.827843][T10191] Nov 9 16:15:48 syzkaller kern.notice kernel: [ 298.575606][T10191] FAULT_INJECTION: forcing a failure. Nov 9 16:15:48 syzkaller kern.notice kernel: [ 298.575606][T10191] name fail_usercopy, interval 1, probability 0, space 0, times 0 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.602226][T10191] CPU: 1 UID: 0 PID: 10191 Comm: syz.0.1421 Not tainted 6.12.0-rc6-syzkaller-00272-gda4373fbcf00 #0 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.613031][T10191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.623096][T10191] Call Trace: Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.626379][T10191] Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.629307][T10191] dump_stack_lvl+0x16c/0x1f0 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.633988][T10191] should_fail_ex+0x497/0x5b0 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.638670][T10191] _copy_from_user+0x2e/0xd0 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.643265][T10191] do_ip_setsockopt+0x25dc/0x38b0 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.648294][T10191] ? __pfx_do_ip_setsockopt+0x10/0x10 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.653665][T10191] ? sock_has_perm+0x25d/0x2f0 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.658437][T10191] ? __pfx_sock_has_perm+0x10/0x10 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.663563][T10191] ? selinux_netlbl_socket_setsockopt+0x184/0x470 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.669994][T10191] ? __pfx_selinux_netlbl_socket_setsockopt+0x10/0x10 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.676776][T10191] ip_setsockopt+0x59/0xf0 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.681230][T10191] udp_setsockopt+0x7d/0xd0 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.685749][T10191] ? __pfx_sock_common_setsockopt+0x10/0x10 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.691655][T10191] do_sock_setsockopt+0x222/0x480 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.696692][T10191] ? __pfx_do_sock_setsockopt+0x10/0x10 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.702241][T10191] ? fdget+0x176/0x210 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.706310][T10191] __sys_setsockopt+0x1a4/0x270 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.711151][T10191] ? __pfx___sys_setsockopt+0x10/0x10 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.716509][T10191] ? fput+0x30/0x390 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.720393][T10191] ? ksys_write+0x1ad/0x260 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.724886][T10191] ? __pfx_ksys_write+0x10/0x10 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.729729][T10191] __x64_sys_setsockopt+0xbd/0x160 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.734826][T10191] ? do_syscall_64+0x91/0x250 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.739486][T10191] ? lockdep_hardirqs_on+0x7c/0x110 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.744673][T10191] do_[ 299.126837][ T29] kauditd_printk_skb: 529 callbacks suppressed syscall_64+0xcd/[ 299.126851][ T29] audit: type=1400 audit(1731168948.443:6991): avc: denied { read write } for pid=5836 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 0x250 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.749162][T10191] entry_SYSCALL_64_after_hwframe+0x77/0x7f Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.755044][T10191] RIP: 0033:0x7fdc0c17e719 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.759443][T10191] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 [ 299.188082][ T29] audit: type=1400 audit(1731168948.453:6992): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 [ 299.216861][ T29] audit: type=1400 audit(1731168948.463:6993): avc: denied { execmem } for pid=10212 comm="syz.1.1429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.779036][T10191] RSP: 002b:00007fdc0cf13038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.787434][T10191] RAX: ffffffffffffffda RBX: 00007fdc0c335f80 RCX: 00007fdc0c17e719 N[ 299.264869][ T29] audit: type=1400 audit(1731168948.463:6994): avc: denied { prog_load } for pid=10212 comm="syz.1.1429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 ov 9 16:15:48 syzkaller kern.warn kernel: [ 298.795998][T10191] RDX: 0000000000000029 RSI: 0000000000000000 RDI: 0000000000000003 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.803969][T10191] RBP: 00007fdc0cf13090 R08: 0000000000000[ 299.304659][ T29] audit: type=1400 audit(1731168948.463:6995): avc: denied { name_bind } for pid=10212 comm="syz.1.1429" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 014 R09: 0000000000000000 Nov 9 16:15:48 syzkaller kern.warn kernel: [ 298.81[ 299.332874][ T29] audit: type=1400 audit(1731168948.473:6996): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 1922][T10191] R10: 0000000020000080 R11: 0000000000000246 R12: 0[ 299.360517][ T29] audit: type=1400 audit(1731168948.473:6997): avc: denied { read write } for pid=5832 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 000000000000001 Nov 9 16:15:48 syzkaller kern.warn kernel: [ [ 299.389947][ T29] audit: type=1400 audit(1731168948.503:6998): avc: denied { prog_load } for pid=10214 comm="syz.0.1430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 298.819879][T10191] R13: 0000000000000000 R14: 00007fdc0c335f80 R15: 00007ffc9fc4f098 Nov 9 16:15:48 syzkaller[ 299.418551][ T29] audit: type=1400 audit(1731168948.513:6999): avc: denied { execmem } for pid=10214 comm="syz.0.1430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 kern.warn kernel: [ 298.827843][T10191] Nov 9 16:15[ 299.443363][ T29] audit: type=1400 audit(1731168948.513:7000): avc: denied { create } for pid=10214 comm="syz.0.1430" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 :48 syzkaller kern.warn kernel: [ 299.126837][ T29] kauditd_printk_skb: 529 callbacks suppressed Nov 9 16:15:48 syzkaller kern.notice kernel: [ 299.126851][ T29] audit: type=1400 audit(1731168948.443:6991): avc: denied { read write } for pid=5836 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 9 16:15:48 syzkaller kern.notice kernel: [ 299.188082][ T29] audit: type=1400 audit(1731168948.453:6992): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 9 16:15:48 syzkaller kern.notice kernel: [ 299.216861][ T29] audit: type=1400 audit(1731168948.463:6993): avc: denied { execmem } for pid=10212 comm="syz.1.1429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Nov 9 16:15:48 syzkaller kern.notice kernel: [ 299.264869][ T29] audit: type=1400 audit(1731168948.463:6994): avc: denied { prog_load } for pid=10212 comm="syz.1.1429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Nov 9 16:15:48 syzkaller kern.notice kernel: [ 299.304659][ T29] audit: type=1400 audit(1731168948.463:6995): avc: denied { name_bind } for pid=10212 comm="syz.1.1429" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_s Nov 9 16:15:48 syzkaller kern.notice kernel: [ 299.332874][ T29] audit: type=1400 audit(1731168948.473:6996): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 9 16:15:48 syzkaller kern.notice kernel: [ 299.360517][ T29] audit: type=1400 audit(1731168948.473:6997): avc: denied { read write } for pid=5832 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 9 16:15:48 syzkaller kern.notice kernel: [ 299.389947][ T29] audit: type=1400 audit(1731168948.503:6998): avc: denied { prog_load } for pid=10214 comm="syz.0.1430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Nov 9 16:15:48 syzkaller kern.notice kernel: [ 299.418551][ T29] audit: type=1400 audit(1731168948.513:6999): avc: denied { execmem } for pid=10214 comm="syz.0.1430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Nov 9 16:15:48 syzkaller kern.notice kernel: [ 299.443363][ T29] audit: type=1400 audit(1731168948.513:7000): avc: denied { create } for pid=10214 comm="syz.0.1430" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode [ 301.704622][T10295] FAULT_INJECTION: forcing a failure. [ 301.704622][T10295] name failslab, interval 1, probability 0, space 0, times 0 [ 301.717653][T10295] CPU: 1 UID: 0 PID: 10295 Comm: syz.3.1463 Not tainted 6.12.0-rc6-syzkaller-00272-gda4373fbcf00 #0 [ 301.728430][T10295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 301.738499][T10295] Call Trace: [ 301.741782][T10295] [ 301.744725][T10295] dump_stack_lvl+0x16c/0x1f0 [ 301.749418][T10295] should_fail_ex+0x497/0x5b0 [ 301.754112][T10295] ? fs_reclaim_acquire+0xae/0x150 [ 301.759235][T10295] should_failslab+0xc2/0x120 [ 301.762369][T10297] FAULT_INJECTION: forcing a failure. [ 301.762369][T10297] name failslab, interval 1, probability 0, space 0, times 0 [ 301.763937][T10295] kmem_cache_alloc_node_noprof+0x71/0x310 [ 301.782308][T10295] ? __alloc_skb+0x2b1/0x380 [ 301.786889][T10295] __alloc_skb+0x2b1/0x380 [ 301.791281][T10295] ? __pfx___alloc_skb+0x10/0x10 [ 301.796197][T10295] ? __pfx_netlink_autobind.isra.0+0x10/0x10 [ 301.802168][T10295] netlink_alloc_large_skb+0x69/0x130 [ 301.807535][T10295] netlink_sendmsg+0x689/0xd70 [ 301.812295][T10295] ? __pfx_netlink_sendmsg+0x10/0x10 [ 301.817569][T10295] ____sys_sendmsg+0xaaf/0xc90 [ 301.822319][T10295] ? copy_msghdr_from_user+0x10b/0x160 [ 301.827782][T10295] ? __pfx_____sys_sendmsg+0x10/0x10 [ 301.833136][T10295] ? __pfx___lock_acquire+0x10/0x10 [ 301.838310][T10295] ___sys_sendmsg+0x135/0x1e0 [ 301.842963][T10295] ? __pfx____sys_sendmsg+0x10/0x10 [ 301.848155][T10295] ? lock_acquire+0x2f/0xb0 [ 301.852646][T10295] ? __fget_files+0x40/0x3f0 [ 301.857220][T10295] ? fdget+0x176/0x210 [ 301.861268][T10295] __sys_sendmmsg+0x1a1/0x450 [ 301.865928][T10295] ? __pfx___sys_sendmmsg+0x10/0x10 [ 301.871119][T10295] ? vfs_write+0x306/0x1150 [ 301.875620][T10295] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 301.881579][T10295] ? fput+0x30/0x390 [ 301.885463][T10295] ? ksys_write+0x1ad/0x260 [ 301.889957][T10295] ? __pfx_ksys_write+0x10/0x10 [ 301.894788][T10295] __x64_sys_sendmmsg+0x9c/0x100 [ 301.899703][T10295] ? lockdep_hardirqs_on+0x7c/0x110 [ 301.904879][T10295] do_syscall_64+0xcd/0x250 [ 301.909369][T10295] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 301.915239][T10295] RIP: 0033:0x7ff66f17e719 [ 301.919630][T10295] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 301.939308][T10295] RSP: 002b:00007ff66feda038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 301.947701][T10295] RAX: ffffffffffffffda RBX: 00007ff66f335f80 RCX: 00007ff66f17e719 [ 301.955671][T10295] RDX: 040000000000009f RSI: 00000000200002c0 RDI: 0000000000000003 [ 301.963639][T10295] RBP: 00007ff66feda090 R08: 0000000000000000 R09: 0000000000000000 [ 301.971598][T10295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 301.979565][T10295] R13: 0000000000000000 R14: 00007ff66f335f80 R15: 00007ffff08a5d38 [ 301.987545][T10295] [ 301.991120][T10297] CPU: 1 UID: 0 PID: 10297 Comm: syz.0.1464 Not tainted 6.12.0-rc6-syzkaller-00272-gda4373fbcf00 #0 [ 302.001861][T10297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 302.011905][T10297] Call Trace: [ 302.015159][T10297] [ 302.018078][T10297] dump_stack_lvl+0x16c/0x1f0 [ 302.022744][T10297] should_fail_ex+0x497/0x5b0 [ 302.027394][T10297] ? fs_reclaim_acquire+0xae/0x150 [ 302.032479][T10297] should_failslab+0xc2/0x120 [ 302.037131][T10297] kmem_cache_alloc_node_noprof+0x71/0x310 [ 302.042925][T10297] ? __alloc_skb+0x2b1/0x380 [ 302.047556][T10297] __alloc_skb+0x2b1/0x380 [ 302.052011][T10297] ? __pfx___alloc_skb+0x10/0x10 [ 302.056966][T10297] ? __pfx_netlink_autobind.isra.0+0x10/0x10 [ 302.056996][T10297] netlink_alloc_large_skb+0x69/0x130 [ 302.057017][T10297] netlink_sendmsg+0x689/0xd70 [ 302.057033][T10297] ? __pfx_netlink_sendmsg+0x10/0x10 [ 302.057053][T10297] ____sys_sendmsg+0xaaf/0xc90 [ 302.057073][T10297] ? copy_msghdr_from_user+0x10b/0x160 [ 302.057089][T10297] ? __pfx_____sys_sendmsg+0x10/0x10 [ 302.057112][T10297] ? __pfx___lock_acquire+0x10/0x10 [ 302.057128][T10297] ___sys_sendmsg+0x135/0x1e0 [ 302.057144][T10297] ? __pfx____sys_sendmsg+0x10/0x10 [ 302.057167][T10297] ? lock_acquire+0x2f/0xb0 [ 302.057179][T10297] ? __fget_files+0x40/0x3f0 [ 302.057205][T10297] ? fdget+0x176/0x210 [ 302.057225][T10297] __sys_sendmmsg+0x1a1/0x450 [ 302.057242][T10297] ? __pfx___sys_sendmmsg+0x10/0x10 [ 302.057256][T10297] ? vfs_write+0x306/0x1150 [ 302.057288][T10297] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 302.057309][T10297] ? fput+0x30/0x390 [ 302.057324][T10297] ? ksys_write+0x1ad/0x260 [ 302.057343][T10297] ? __pfx_ksys_write+0x10/0x10 [ 302.057365][T10297] __x64_sys_sendmmsg+0x9c/0x100 [ 302.057380][T10297] ? lockdep_hardirqs_on+0x7c/0x110 [ 302.057400][T10297] do_syscall_64+0xcd/0x250 [ 302.057414][T10297] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 302.057434][T10297] RIP: 0033:0x7fdc0c17e719 [ 302.057447][T10297] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 302.057460][T10297] RSP: 002b:00007fdc0cf13038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 302.057474][T10297] RAX: ffffffffffffffda RBX: 00007fdc0c335f80 RCX: 00007fdc0c17e719 [ 302.057483][T10297] RDX: 040000000000009f RSI: 00000000200002c0 RDI: 0000000000000003 [ 302.057493][T10297] RBP: 00007fdc0cf13090 R08: 0000000000000000 R09: 0000000000000000 [ 302.057501][T10297] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 302.057510][T10297] R13: 0000000000000000 R14: 00007fdc0c335f80 R15: 00007ffc9fc4f098 [ 302.057526][T10297] Nov 9 16:15:51 syzkaller kern.notice kernel: [ 301.704622][T10295] FAULT_INJECTION: forcing a failure. Nov 9 16:15:51 syzkaller kern.notice kernel: [ 301.704622][T10295] name failslab, interval 1, probability 0, space 0, times 0 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.717653][T10295] CPU: 1 UID: 0 PID: 10295 Comm: syz.3.1463 Not tainted 6.12.0-rc6-syzkaller-00272-gda4373fbcf00 #0 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.728430][T10295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.738499][T10295] Call Trace: Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.741782][T10295] Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.744725][T10295] dump_stack_lvl+0x16c/0x1f0 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.749418][T10295] should_fail_ex+0x497/0x5b0 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.754112][T10295] ? fs_reclaim_acquire+0xae/0x150 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.759235][T10295] should_failslab+0xc2/0x120 Nov 9 16:15:51 syzkaller kern.notice kernel: [ 301.762369][T10297] FAULT_INJECTION: forcing a failure. Nov 9 16:15:51 syzkaller kern.notice kernel: [ 301.762369][T10297] name failslab, interval 1, probability 0, space 0, times 0 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.763937][T10295] kmem_cache_alloc_node_noprof+0x71/0x310 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.782308][T10295] ? __alloc_skb+0x2b1/0x380 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.786889][T10295] __alloc_skb+0x2b1/0x380 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.791281][T10295] ? __pfx___alloc_skb+0x10/0x10 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.796197][T10295] ? __pfx_netlink_autobind.isra.0+0x10/0x10 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.802168][T10295] netlink_alloc_large_skb+0x69/0x130 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.807535][T10295] netlink_sendmsg+0x689/0xd70 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.812295][T10295] ? __pfx_netlink_sendmsg+0x10/0x10 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.817569][T10295] ____sys_sendmsg+0xaaf/0xc90 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.822319][T10295] ? copy_msghdr_from_user+0x10b/0x160 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.827782][T10295] ? __pfx_____sys_sendmsg+0x10/0x10 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.833136][T10295] ? __pfx___lock_acquire+0x10/0x10 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.838310][T10295] ___sys_sendmsg+0x135/0x1e0 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.842963][T10295] ? __pfx____sys_sendmsg+0x10/0x10 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.848155][T10295] ? lock_acquire+0x2f/0xb0 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.852646][T10295] ? __fget_files+0x40/0x3f0 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.857220][T10295] ? fdget+0x176/0x210 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.861268][T10295] __sys_sendmmsg+0x1a1/0x450 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.865928][T10295] ? __pfx___sys_sendmmsg+0x10/0x10 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.871119][T10295] ? vfs_write+0x306/0x1150 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.875620][T10295] ? __pfx___mutex_unlock_slowpath+0x10/0x10 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.881579][T10295] ? fput+0x30/0x390 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.885463][T10295] ? ksys_write+0x1ad/0x260 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.889957][T10295] ? __pfx_ksys_write+0x10/0x10 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.894788][T10295] __x64_sys_sendmmsg+0x9c/0x100 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.899703][T10295] ? lockdep_hardirqs_on+0x7c/0x110 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.904879][T10295] do_syscall_64+0xcd/0x250 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.909369][T10295] entry_SYSCALL_64_after_hwframe+0x77/0x7f Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.915239][T10295] RIP: 0033:0x7ff66f17e719 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 301.919630][T10295] Code: ffNov 9 16:15:51 syzkaller kern.warn kernel: [ 301.955671][T1029Nov 9 16:15:51 Nov 9 16:15:51 Nov 9 16:15:51 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 3Nov 9 16:15:51 Nov 9 16:15:51 Nov 9 16:15:51 syzkaller kern.warn kernel: [ 3Nov 9 16:15:51 Nov 9 16:15:51 Nov 9 16:15:51 Nov 9 16:15:51 Nov 9 16:15:51 Nov 9 16:15:51 Nov 9 16:15:51 [ 302.880522][T10329] FAULT_INJECTION: forcing a failure. [ 302.880522][T10329] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 302.893893][T10329] CPU: 0 UID: 0 PID: 10329 Comm: syz.4.1477 Not tainted 6.12.0-rc6-syzkaller-00272-gda4373fbcf00 #0 [ 302.904670][T10329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 302.914727][T10329] Call Trace: [ 302.918006][T10329] [ 302.920930][T10329] dump_stack_lvl+0x16c/0x1f0 [ 302.925618][T10329] should_fail_ex+0x497/0x5b0 [ 302.930310][T10329] _copy_from_user+0x2e/0xd0 [ 302.934908][T10329] kstrtouint_from_user+0xd7/0x1c0 [ 302.940030][T10329] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 302.945774][T10329] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 302.951415][T10329] proc_fail_nth_write+0x84/0x250 [ 302.956451][T10329] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 302.962103][T10329] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 302.967734][T10329] vfs_write+0x24c/0x1150 [ 302.972057][T10329] ? __fget_files+0x23a/0x3f0 [ 302.976721][T10329] ? fdget_pos+0x24c/0x360 [ 302.981121][T10329] ? __pfx_lock_release+0x10/0x10 [ 302.986126][T10329] ? trace_lock_acquire+0x14a/0x1d0 [ 302.991311][T10329] ? __pfx_vfs_write+0x10/0x10 [ 302.996061][T10329] ? __pfx___mutex_lock+0x10/0x10 [ 303.001075][T10329] ? __fget_files+0x244/0x3f0 [ 303.005745][T10329] ksys_write+0x12f/0x260 [ 303.010064][T10329] ? __pfx_ksys_write+0x10/0x10 [ 303.014909][T10329] do_syscall_64+0xcd/0x250 [ 303.019396][T10329] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 303.025277][T10329] RIP: 0033:0x7fe27217d1ff [ 303.029678][T10329] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48 [ 303.049279][T10329] RSP: 002b:00007fe273018030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 303.057679][T10329] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fe27217d1ff [ 303.065634][T10329] RDX: 0000000000000001 RSI: 00007fe2730180a0 RDI: 0000000000000003 [ 303.073590][T10329] RBP: 00007fe273018090 R08: 0000000000000000 R09: 0000000000000000 [ 303.081543][T10329] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 303.089511][T10329] R13: 0000000000000000 R14: 00007fe272335f80 R15: 00007ffcbc7bb338 [ 303.097477][T10329] Nov 9 16:15:52 syzkaller kern.notice kernel: [ 302.880522][T10329] FAULT_INJECTION: forcing a failure. Nov 9 16:15:52 syzkaller kern.notice kernel: [ 302.880522][T10329] name fail_usercopy, interval 1, probability 0, space 0, times 0 Nov 9 16:15:52 syzkaller kern.warn kernel: [ 302.893893][T10329] CPU: 0 UID: 0 PID: 10329 Comm: syz.4.1477 Not tainted 6.12.0-rc6-syzkaller-00272-gda4373fbcf00 #0 Nov 9 16:15:52 syzkaller kern.warn kernel: [ 302.904670][T10329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 Nov 9 16:15:52 syzkaller kern.warn kernel: [ 302.914727][T10329] Call Trace: Nov 9 16:15:52 syzkaller kern.warn kernel: [ 302.918006][T10329] Nov 9 16:15:52 syzkaller kern.warn kernel: [ 302.920930][T10329] dump_stack_lvl+0x16c/0x1f0 Nov 9 16:15:52 syzkaller kern.warn kernel: [ 302.925618][T10329] should_fail_ex+0x497/0x5b0 Nov 9 16:15:52 syzkaller kern.warn kernel: [ 302.930310][T10329] _copy_from_user+0x2e/0xd0 Nov 9 16:15:52 syzkaller kern.warn kernel: [ 302.934908][T10329] kstrtouint_from_user+0xd7/0x1c0 Nov 9 16:15:52 syzkaller kern.warn kernel: [ 302.940030][T10329] ? __pfx_kstrtouint_from_user+0x10/0x10 Nov 9 16:15:52 syzkaller kern.warn kernel: [ 302.945774][T10329] ? __pfx_lock_acquire.part.0+0x10/0x10 Nov 9 16:15:52 syzkaller kern.warn kernel: [ 302.951415][T10329] proc_fail_nth_write+0x84/0x250 Nov 9 16:15:52 syzkaller kern.warn kernel: [ 302.956451][T10329] ? __pfx_proc_fail_nth_write+0x10/0x10 Nov 9 16:15:52 syzkaller kern.warn kernel: [ 302.962103][T10329] ? __pfx_proc_fail_nth_write+0x10/0x10 Nov 9 16:15:52 syzkaller kern.warn kernel: [ 302.967734][T10329] vfs_write+0x24c/0x1150 Nov 9 16:15:52 syzkaller kern.warn kernel: [ 302.972057][T10329] ? __fget_files+0x23a/0x3f0 Nov 9 16:15:52 syzkaller kern.warn kernel: [ 302.976721][T10329] ? fdget_pos+0x24c/0x360 Nov 9 16:15:52 syzkaller kern.warn kernel: [ 302.981121][T10329] ? __pfx_lock_release+0x10/0x10 Nov 9 16:15:52 syzkaller kern.warn kernel: [ 302.986126][T10329] ? trace_lock_acquire+0x14a/0x1d0 Nov 9 16:15:52 syzkaller kern.warn kernel: [ 302.991311][T10329] ? __pfx_vfs_write+0x10/0x10 Nov 9 16:15:52 syzkaller kern.warn kernel: [ 302.996061][T10329] ? __pfx___mutex_lock+0x10/0x10 Nov 9 16:15:52 syzkaller kern.warn kernel: [ 303.001075][T10329] ? __fget_files+0x244/0x3f0 Nov 9 16:15:52 syzkaller kern.warn kernel: [ 303.005745][T10329] ksys_write+0x12f/0x260 Nov 9 16:15:52 syzkaller kern.warn kernel: [ 303.010064][T10329] ? __pfx_ksys_write+0x10/0x10 Nov 9 16:15:52 syzkaller kern.warn kernel: [ 303.014909][T10329] do_syscall_64+0xcd/0x250 Nov 9 16:15:52 syzkaller kern.warn kernel: [ 303.019396][T10329] entry_SYSCALL_64_after_hwframe+0x77/0x7f Nov 9 16:15:52 syzkaller kern.warn kernel: [ 303.025277][T10329] RIP: 0033:0x7fe27217d1ff Nov 9 16:15:52 syzkaller kern.warn kernel: [ 303.029678][T10329] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48 Nov 9 16:15:52 syzkaller kern.warn kernel: [ 303.049279][T10329] RSP: 002b:00007fe273018030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 Nov 9 16:15:52 syzkaller kern.warn kernel: [ 303.057679][T10329] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fe27217d1ff Nov 9 16:15:52 syzkaller kern.warn kernel: [ 303.065634][T10329] RDX: 0000000000000001 RSI: 00007fe2730180a0 RDI: 0000000000000003 Nov 9 16:15:52 syzkaller kern.warn kernel: [ 303.073590][T10329] RBP: 00007fe273018090 R08: 0000000000000000 R09: 0000000000000000 Nov 9 16:15:52 syzkaller kern.warn kernel: [ 303.081543][T10329] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 Nov 9 16:15:52 syzkaller kern.warn kernel: [ 303.089511][T10329] R13: 0000000000000000 R14: 00007fe272335f80 R15: 00007ffcbc7bb338 Nov 9 16:15:52 syzkaller kern.warn kernel: [ 303.097477][T10329] [ 303.783556][T10350] FAULT_INJECTION: forcing a failure. [ 303.783556][T10350] name failslab, interval 1, probability 0, space 0, times 0 [ 303.803630][T10350] CPU: 0 UID: 0 PID: 10350 Comm: syz.4.1485 Not tainted 6.12.0-rc6-syzkaller-00272-gda4373fbcf00 #0 [ 303.814425][T10350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 303.824490][T10350] Call Trace: [ 303.827788][T10350] [ 303.830717][T10350] dump_stack_lvl+0x16c/0x1f0 [ 303.835399][T10350] should_fail_ex+0x497/0x5b0 [ 303.840077][T10350] ? fs_reclaim_acquire+0xae/0x150 [ 303.845191][T10350] should_failslab+0xc2/0x120 [ 303.849874][T10350] kmem_cache_alloc_node_noprof+0x71/0x310 [ 303.855684][T10350] ? __alloc_skb+0x2b1/0x380 [ 303.860275][T10350] __alloc_skb+0x2b1/0x380 [ 303.864697][T10350] ? __pfx___alloc_skb+0x10/0x10 [ 303.869653][T10350] ? __pfx_netlink_autobind.isra.0+0x10/0x10 [ 303.875647][T10350] netlink_alloc_large_skb+0x69/0x130 [ 303.881031][T10350] netlink_sendmsg+0x689/0xd70 [ 303.885798][T10350] ? __pfx_netlink_sendmsg+0x10/0x10 [ 303.891092][T10350] ____sys_sendmsg+0xaaf/0xc90 [ 303.895861][T10350] ? copy_msghdr_from_user+0x10b/0x160 [ 303.901319][T10350] ? __pfx_____sys_sendmsg+0x10/0x10 [ 303.906614][T10350] ? __pfx___lock_acquire+0x10/0x10 [ 303.911816][T10350] ___sys_sendmsg+0x135/0x1e0 [ 303.916499][T10350] ? __pfx____sys_sendmsg+0x10/0x10 [ 303.921712][T10350] ? lock_acquire+0x2f/0xb0 [ 303.926213][T10350] ? __fget_files+0x40/0x3f0 [ 303.930818][T10350] ? fdget+0x176/0x210 [ 303.934896][T10350] __sys_sendmsg+0x117/0x1f0 [ 303.939490][T10350] ? __pfx___sys_sendmsg+0x10/0x10 [ 303.944600][T10350] ? __fget_files+0x244/0x3f0 [ 303.949306][T10350] do_syscall_64+0xcd/0x250 [ 303.953811][T10350] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 303.959710][T10350] RIP: 0033:0x7fe27217e719 [ 303.964123][T10350] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 303.983746][T10350] RSP: 002b:00007fe273018038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 303.992165][T10350] RAX: ffffffffffffffda RBX: 00007fe272335f80 RCX: 00007fe27217e719 [ 304.000135][T10350] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 304.008104][T10350] RBP: 00007fe273018090 R08: 0000000000000000 R09: 0000000000000000 [ 304.016072][T10350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 304.024045][T10350] R13: 0000000000000000 R14: 00007fe272335f80 R15: 00007ffcbc7bb338 [ 304.032030][T10350] Nov 9 16:15:53 syzkaller kern.notice kernel: [ 303.783556][T10350] FAULT_INJECTION: forcing a failure. Nov 9 16:15:53 syzkaller kern.notice kernel: [ 303.783556][T10350] name failslab, interval 1, probability 0, space 0, times 0 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.803630][T10350] CPU: 0 UID: 0 PID: 10350 Comm: syz.4.1485 Not tainted 6.12.0-rc6-syzkaller-00272-gda4373fbcf00 #0 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.814425][T10350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.824490][T10350] Call Trace: Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.827788][T10350] Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.830717][T10350] dump_stack_lvl+0x16c/0x1f0 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.835399][T10350] should_fail_ex+0x497/0x5b0 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.840077][T10350] ? fs_reclaim_acquire+0xae/0x150 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.845191][T10350] should_failslab+0xc2/0x120 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.849874][T10350] kmem_cache_alloc_node_noprof+0x71/0x310 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.855684][T10350] ? __alloc_skb+0x2b1/0x380 Nov 9 16:15:53 syzkaller kern.warn [ 304.159098][ T29] kauditd_printk_skb: 441 callbacks suppressed kernel: [ 303.8[ 304.159114][ T29] audit: type=1400 audit(1731168953.473:7442): avc: denied { prog_load } for pid=10356 comm="syz.4.1488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 60275][T10350] __alloc_skb+0x2b1/0x380 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.864697][T10350] ? _[ 304.194541][ T29] audit: type=1400 audit(1731168953.503:7443): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 _pfx___alloc_skb[ 304.217985][ T29] audit: type=1400 audit(1731168953.503:7444): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 +0x10/0x10 Nov 9 16:15:53 syzk[ 304.242562][ T29] audit: type=1400 audit(1731168953.503:7445): avc: denied { read } for pid=10354 comm="syz.3.1487" name="loop-control" dev="devtmpfs" ino=646 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=0 aller kern.warn kernel: [ 303.869653][T10350] ? __pfx_netlink_autobind.isra.0+[ 304.274498][ T29] audit: type=1400 audit(1731168953.513:7446): avc: denied { execmem } for pid=10356 comm="syz.4.1488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 0x10/0x10 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.87[ 304.299273][ T29] audit: type=1400 audit(1731168953.513:7447): avc: denied { execmem } for pid=10354 comm="syz.3.1487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 5647][T10350] netlink_alloc_large_skb+0x69/0x130 Nov 9 16:15:[ 304.323159][ T29] audit: type=1400 audit(1731168953.553:7448): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 53 syzkaller ker[ 304.347820][ T29] audit: type=1400 audit(1731168953.553:7449): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 n.warn kernel: [ 303.881031][T10350] netlink_sendmsg+0x689/0xd[ 304.374026][ T29] audit: type=1400 audit(1731168953.583:7450): avc: denied { map_create } for pid=10354 comm="syz.3.1487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 70 Nov 9 16:15[ 304.395002][ T29] audit: type=1400 audit(1731168953.583:7451): avc: denied { prog_load } for pid=10354 comm="syz.3.1487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 :53 syzkaller kern.warn kernel: [ 303.885798][T10350] ? __pfx_netlink_sendmsg+0x10/0x10 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.891092][T10350] ____sys_sendmsg+0xaaf/0xc90 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.895861][T10350] ? copy_msghdr_from_user+0x10b/0x160 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.901319][T10350] ? __pfx_____sys_sendmsg+0x10/0x10 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.906614][T10350] ? __pfx___lock_acquire+0x10/0x10 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.911816][T10350] ___sys_sendmsg+0x135/0x1e0 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.916499][T10350] ? __pfx____sys_sendmsg+0x10/0x10 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.921712][T10350] ? lock_acquire+0x2f/0xb0 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.926213][T10350] ? __fget_files+0x40/0x3f0 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.930818][T10350] ? fdget+0x176/0x210 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.934896][T10350] __sys_sendmsg+0x117/0x1f0 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.939490][T10350] ? __pfx___sys_sendmsg+0x10/0x10 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.944600][T10350] ? __fget_files+0x244/0x3f0 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.949306][T10350] do_syscall_64+0xcd/0x250 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.953811][T10350] entry_SYSCALL_64_after_hwframe+0x77/0x7f Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.959710][T10350] RIP: 0033:0x7fe27217e719 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.964123][T10350] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.983746][T10350] RSP: 002b:00007fe273018038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e Nov 9 16:15:53 syzkaller kern.warn kernel: [ 303.992165][T10350] RAX: ffffffffffffffda RBX: 00007fe272335f80 RCX: 00007fe27217e719 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 304.000135][T10350] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 304.008104][T10350] RBP: 00007fe273018090 R08: 0000000000000000 R09: 0000000000000000 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 304.016072][T10350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 Nov 9 16:15:53 syzkaller kern.warn kernel: [ 304.024045][T10350] R13: 00000000000000Nov 9 16:15:53 syzkaller kern.warn kernel: [ 304.159098][ T29] kauditd_printk_skb: 441 callbacks suppressed Nov 9 16:15:53 syzkaller kern.notice kernel: [ 304.159114][ T29] audit: type=1400 audit(1731168953.473:7442): avc: denied { prog_load } for pid=10356 comm="syz.4.1488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Nov 9 16:15:53 syzkaller kern.notice kernel: [ 304.194541][ T29] audit: type=1400 audit(1731168953.503:7443): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 9 16:15:53 syzkaller kern.notice kernel: [ 304.217985][ T29] audit: type=1400 audit(1731168953.503:7444): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 9 16:15:53 syzkaller kern.notice kernel: [ 304.242562][ T29] audit: type=1400 audit(1731168953.503:7445): avc: denied { read } for pid=10354 comm="syz.3.1487" name="loop-control" dev="devtmpfs" ino=646 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:lo Nov 9 16:15:53 syzkaller kern.notice kernel: [ 304.274498][ T29] audit: type=1400 audit(1731168953.513:7446): avc: denied { execmem }Nov 9 16:15:53 Nov 9 16:15:53 syzkaller kern.notice kernel: [ 304.323159][ Nov 9 16:15:53 Nov 9 16:15:53 syzkaller kern.notice kernel: [ 304.374026][ T29] audit: type[ 306.067625][T10411] FAULT_INJECTION: forcing a failure. [ 306.067625][T10411] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 306.112309][T10411] CPU: 0 UID: 0 PID: 10411 Comm: syz.0.1508 Not tainted 6.12.0-rc6-syzkaller-00272-gda4373fbcf00 #0 [ 306.123116][T10411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 306.133173][T10411] Call Trace: [ 306.136447][T10411] [ 306.139377][T10411] dump_stack_lvl+0x16c/0x1f0 [ 306.144061][T10411] should_fail_ex+0x497/0x5b0 [ 306.148744][T10411] _copy_from_user+0x2e/0xd0 [ 306.153511][T10411] kstrtouint_from_user+0xd7/0x1c0 [ 306.158645][T10411] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 306.164388][T10411] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 306.170028][T10411] proc_fail_nth_write+0x84/0x250 [ 306.175061][T10411] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 306.180706][T10411] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 306.186339][T10411] vfs_write+0x24c/0x1150 [ 306.190680][T10411] ? __fget_files+0x23a/0x3f0 [ 306.195367][T10411] ? fdget_pos+0x24c/0x360 [ 306.199786][T10411] ? __pfx_lock_release+0x10/0x10 [ 306.204810][T10411] ? trace_lock_acquire+0x14a/0x1d0 [ 306.210016][T10411] ? __pfx_vfs_write+0x10/0x10 [ 306.214785][T10411] ? __pfx___mutex_lock+0x10/0x10 [ 306.219826][T10411] ? __fget_files+0x244/0x3f0 [ 306.224544][T10411] ksys_write+0x12f/0x260 [ 306.228882][T10411] ? __pfx_ksys_write+0x10/0x10 [ 306.233748][T10411] do_syscall_64+0xcd/0x250 [ 306.238251][T10411] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 306.244152][T10411] RIP: 0033:0x7fdc0c17d1ff [ 306.248564][T10411] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48 [ 306.268173][T10411] RSP: 002b:00007fdc0cf13030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 306.276593][T10411] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fdc0c17d1ff [ 306.284565][T10411] RDX: 0000000000000001 RSI: 00007fdc0cf130a0 RDI: 0000000000000003 [ 306.292536][T10411] RBP: 00007fdc0cf13090 R08: 0000000000000000 R09: 0000000000000000 [ 306.300502][T10411] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 306.308472][T10411] R13: 0000000000000000 R14: 00007fdc0c335f80 R15: 00007ffc9fc4f098 [ 306.316452][T10411] Nov 9 16:15:55 syzkaller kern.notice kernel: [ 306.067625][T10411] FAULT_INJECTION: forcing a failure. Nov 9 16:15:55 syzkaller kern.notice kernel: [ 306.067625][T10411] name fail_usercopy, interval 1, probability 0, space 0, times 0 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.112309][T10411] CPU: 0 UID: 0 PID: 10411 Comm[ 306.381202][T10417] FAULT_INJECTION: forcing a failure. [ 306.381202][T10417] name failslab, interval 1, probability 0, space 0, times 0 : syz.0.1508 Not[ 306.395408][T10417] CPU: 1 UID: 0 PID: 10417 Comm: syz.3.1510 Not tainted 6.12.0-rc6-syzkaller-00272-gda4373fbcf00 #0 [ 306.406931][T10417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 306.416997][T10417] Call Trace: [ 306.420284][T10417] [ 306.423220][T10417] dump_stack_lvl+0x16c/0x1f0 [ 306.427908][T10417] should_fail_ex+0x497/0x5b0 [ 306.432592][T10417] ? fs_reclaim_acquire+0xae/0x150 [ 306.437711][T10417] should_failslab+0xc2/0x120 [ 306.442397][T10417] kmem_cache_alloc_node_noprof+0x71/0x310 [ 306.448224][T10417] ? __alloc_skb+0x2b1/0x380 [ 306.452904][T10417] __alloc_skb+0x2b1/0x380 [ 306.457305][T10417] ? __pfx___alloc_skb+0x10/0x10 [ 306.462230][T10417] ? __pfx_netlink_autobind.isra.0+0x10/0x10 [ 306.468202][T10417] netlink_alloc_large_skb+0x69/0x130 [ 306.473578][T10417] netlink_sendmsg+0x689/0xd70 [ 306.478396][T10417] ? __pfx_netlink_sendmsg+0x10/0x10 [ 306.483690][T10417] ____sys_sendmsg+0xaaf/0xc90 [ 306.488447][T10417] ? copy_msghdr_from_user+0x10b/0x160 [ 306.493892][T10417] ? __pfx_____sys_sendmsg+0x10/0x10 [ 306.499187][T10417] ? __pfx___lock_acquire+0x10/0x10 [ 306.504380][T10417] ___sys_sendmsg+0x135/0x1e0 [ 306.509043][T10417] ? __pfx____sys_sendmsg+0x10/0x10 [ 306.514239][T10417] ? lock_acquire+0x2f/0xb0 [ 306.518722][T10417] ? __fget_files+0x40/0x3f0 [ 306.523308][T10417] ? fdget+0x176/0x210 [ 306.527368][T10417] __sys_sendmmsg+0x1a1/0x450 [ 306.532029][T10417] ? __pfx___sys_sendmmsg+0x10/0x10 [ 306.537212][T10417] ? vfs_write+0x306/0x1150 [ 306.541711][T10417] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 306.547679][T10417] ? fput+0x30/0x390 [ 306.551559][T10417] ? ksys_write+0x1ad/0x260 [ 306.556050][T10417] ? __pfx_ksys_write+0x10/0x10 [ 306.560902][T10417] __x64_sys_sendmmsg+0x9c/0x100 [ 306.565834][T10417] ? lockdep_hardirqs_on+0x7c/0x110 [ 306.571028][T10417] do_syscall_64+0xcd/0x250 [ 306.575518][T10417] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 306.581406][T10417] RIP: 0033:0x7ff66f17e719 [ 306.585805][T10417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 306.605403][T10417] RSP: 002b:00007ff66feda038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 306.613808][T10417] RAX: ffffffffffffffda RBX: 00007ff66f335f80 RCX: 00007ff66f17e719 [ 306.621849][T10417] RDX: 040000000000009f RSI: 00000000200002c0 RDI: 0000000000000003 [ 306.629802][T10417] RBP: 00007ff66feda090 R08: 0000000000000000 R09: 0000000000000000 [ 306.637755][T10417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 306.645711][T10417] R13: 0000000000000000 R14: 00007ff66f335f80 R15: 00007ffff08a5d38 [ 306.653674][T10417] tainted 6.12.0-rc6-syzkaller-00272-gda4373fbcf00 #0 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.123116][T10411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.133173][T10411] Call Trace: Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.136447][T10411] Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.139377][T10411] dump_stack_lvl+0x16c/0x1f0 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.144061][T10411] should_fail_ex+0x497/0x5b0 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.148744][T10411] _copy_from_user+0x2e/0xd0 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.153511][T10411] kstrtouint_from_user+0xd7/0x1c0 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.158645][T10411] ? __pfx_kstrtouint_from_user+0x10/0x10 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.164388][T10411] ? __pfx_lock_acquire.part.0+0x10/0x10 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.170028][T10411] proc_fail_nth_write+0x84/0x250 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.175061][T10411] ? __pfx_proc_fail_nth_write+0x10/0x10 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.180706][T10411] ? __pfx_proc_fail_nth_write+0x10/0x10 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.186339][T10411] vfs_write+0x24c/0x1150 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.190680][T10411] ? __fget_files+0x23a/0x3f0 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.195367][T10411] ? fdget_pos[ 306.791526][T10421] FAULT_INJECTION: forcing a failure. [ 306.791526][T10421] name failslab, interval 1, probability 0, space 0, times 0 +0x24c/0x360 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.199786][T10411] ? __pfx_lock_release+0x10/0x10 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.204810][T10411] ? trace_lock_acquire+0x14a/0x1d0 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.210016][T10411] ? __pfx_vfs_write+0x10/0x10 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.214785][T10411] ? __pfx___mutex_lock+0x10/0x10 Nov[ 306.840148][T10421] CPU: 1 UID: 0 PID: 10421 Comm: syz.3.1512 Not tainted 6.12.0-rc6-syzkaller-00272-gda4373fbcf00 #0 [ 306.851633][T10421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 306.861677][T10421] Call Trace: [ 306.864937][T10421] [ 306.867849][T10421] dump_stack_lvl+0x16c/0x1f0 [ 306.872533][T10421] should_fail_ex+0x497/0x5b0 [ 306.877205][T10421] ? fs_reclaim_acquire+0xae/0x150 [ 306.882324][T10421] should_failslab+0xc2/0x120 [ 306.887023][T10421] kmem_cache_alloc_noprof+0x6e/0x2f0 [ 306.892378][T10421] ? vm_area_dup+0x53/0x2f0 [ 306.896861][T10421] vm_area_dup+0x53/0x2f0 [ 306.901168][T10421] __split_vma+0x181/0x1160 [ 306.905663][T10421] ? mark_lock+0xb5/0xc60 [ 306.909970][T10421] ? __pfx___split_vma+0x10/0x10 [ 306.914895][T10421] ? __lock_acquire+0x163e/0x3ce0 [ 306.919912][T10421] vms_gather_munmap_vmas+0x1c7/0x1750 [ 306.925367][T10421] ? __pfx_mark_lock+0x10/0x10 [ 306.930104][T10421] ? hlock_class+0x4e/0x130 [ 306.934597][T10421] ? __pfx_vms_gather_munmap_vmas+0x10/0x10 [ 306.940480][T10421] ? __pfx___lock_acquire+0x10/0x10 [ 306.945654][T10421] ? hlock_class+0x4e/0x130 [ 306.950138][T10421] do_vmi_align_munmap+0x281/0x890 [ 306.955230][T10421] ? __pfx_do_vmi_align_munmap+0x10/0x10 [ 306.960857][T10421] do_vmi_munmap+0x20b/0x3e0 [ 306.965427][T10421] __vm_munmap+0x14f/0x340 [ 306.969821][T10421] ? __pfx___vm_munmap+0x10/0x10 [ 306.974766][T10421] ? __pfx_ksys_write+0x10/0x10 [ 306.979605][T10421] __x64_sys_munmap+0x59/0x80 [ 306.984281][T10421] do_syscall_64+0xcd/0x250 [ 306.988764][T10421] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 306.994658][T10421] RIP: 0033:0x7ff66f17e719 [ 306.999049][T10421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 307.018632][T10421] RSP: 002b:00007ff66feda038 EFLAGS: 00000246 ORIG_RAX: 000000000000000b [ 307.027023][T10421] RAX: ffffffffffffffda RBX: 00007ff66f335f80 RCX: 00007ff66f17e719 [ 307.034984][T10421] RDX: 0000000000000000 RSI: 0000000000001000 RDI: 0000000020002000 [ 307.042943][T10421] RBP: 00007ff66feda090 R08: 0000000000000000 R09: 0000000000000000 [ 307.050904][T10421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 307.058859][T10421] R13: 0000000000000000 R14: 00007ff66f335f80 R15: 00007ffff08a5d38 [ 307.066814][T10421] 9 16:15:55 syzkaller kern.warn kernel: [ 306.219826][T10411] ? __fget_files+0x244/0x3f0 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.224544][T10411] ksys_write+0x12f/0x260 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.228882][T10411] ? __pfx_ksys_write+0x10/0x10 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.233748][T10411] do_syscall_64+0xcd/0x250 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.238251][T10411] entry_SYSCALL_64_after_hwframe+0x77/0x7f Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.244152][T10411] RIP: 0033:0x7fdc0c17d1ff Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.248564][T10411] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.268173][T10411] RSP: 002b:00007fdc0cf13030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.276593][T10411] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fdc0c17d1ff Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.284565][T10411] RDX: 0000000000000001 RSI: 00007fdc0cf130a0 RDI: 0000000000000003 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.292536][T10411] RBP: 00007fdc0cf13090 R08: 0000000000000000 R09: 0000000000000000 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.300502][T10411] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.308472][T10411] R13: 0000000000000000 R14: 00007fdc0c335f80 R15: 00007ffc9fc4f098 Nov 9 16:15:55 syzkaller kern.warn ker[ 307.217005][T10435] FAULT_INJECTION: forcing a failure. [ 307.217005][T10435] name fail_usercopy, interval 1, probability 0, space 0, times 0 nel: [ 306.316452][T10411] [ 307.259982][T10435] dump_stack_lvl+0x16c/0x1f0 [ 307.264666][T10435] should_fail_ex+0x497/0x5b0 [ 307.269352][T10435] _copy_from_user+0x2e/0xd0 [ 307.273951][T10435] kstrtouint_from_user+0xd7/0x1c0 [ 307.279076][T10435] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 307.284815][T10435] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 307.290454][T10435] proc_fail_nth_write+0x84/0x250 [ 307.295486][T10435] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 307.301136][T10435] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 307.306788][T10435] vfs_write+0x24c/0x1150 [ 307.311148][T10435] ? __fget_files+0x23a/0x3f0 [ 307.315845][T10435] ? fdget_pos+0x24c/0x360 [ 307.320266][T10435] ? __pfx_lock_release+0x10/0x10 [ 307.325293][T10435] ? trace_lock_acquire+0x14a/0x1d0 [ 307.330500][T10435] ? __pfx_vfs_write+0x10/0x10 [ 307.335305][T10435] ? __pfx___mutex_lock+0x10/0x10 [ 307.340340][T10435] ? __fget_files+0x244/0x3f0 [ 307.345038][T10435] ksys_write+0x12f/0x260 [ 307.349383][T10435] ? __pfx_ksys_write+0x10/0x10 [ 307.354250][T10435] do_syscall_64+0xcd/0x250 [ 307.358762][T10435] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 307.364671][T10435] RIP: 0033:0x7fdc0c17d1ff [ 307.369092][T10435] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48 [ 307.388712][T10435] RSP: 002b:00007fdc0cf13030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 307.397138][T10435] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fdc0c17d1ff [ 307.405122][T10435] RDX: 0000000000000001 RSI: 00007fdc0cf130a0 RDI: 0000000000000003 [ 307.413101][T10435] RBP: 00007fdc0cf13090 R08: 0000000000000000 R09: 0000000000000000 [ 307.421079][T10435] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 307.429058][T10435] R13: 0000000000000000 R14: 00007fdc0c335f80 R15: 00007ffc9fc4f098 [ 307.437048][T10435] ASK> Nov 9 16:15:55 syzkaller kern.notice kernel: [ 306.381202][T10417] FAULT_INJECTION: forcing a failure. Nov 9 16:15:55 syzkaller kern.notice kernel: [ 306.381202][T10417] name failslab, interval 1, probability 0, space 0, times 0 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.395408][T10417] CPU: 1 UID: 0 PID: 10417 Comm: syz.3.1510 Not tainted 6.12.0-rc6-syzkaller-00272-gda4373fbcf00 #0 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.406931][T10417] Hardware name: Google Google Compute Engine/Google ComNov 9 16:15:55 Nov 9 16:15:55 Nov 9 16:15:55 syzkaller kern.warn kernel: [ 306.452904][T1041[ 307.493976][T10439] netlink: 'syz.0.1519': attribute type 29 has an invalid length. 7] __alloc_skb+0x2b1/0x380 Nov 9 16:15:56 syzkaller kern.warn kernel: [ 306.457305][T10417] [ 307.510330][T10440] netlink: 'syz.0.1519': attribute type 29 has an invalid length. ? __pfx___alloc_skb+0x10/0x10 Nov 9 16:15:56 syzkaller kern.warn kernel: [ 306.462230][T10417] ? __pfx_netlink_autobind.isra.0+0x10/0x10 Nov 9 16:15:56 syzkaller kern.warn kernel: [ 306.468202][T10417] netlink_alloc_large_skb+0x69/Nov 9 16:15:56 Nov 9 16:15:56 Nov 9 16:15:56 Nov 9 16:15:56 Nov 9 16:15:56 Nov 9 16:15:56 syzkaller kern.wNov 9 16:15:56 Nov 9 16:15:56 syzkaller kern.wNov 9 16:15:56 syzkaller kern.wNov 9 16:15:56 syzkaller kern.wNov 9 16:15:56 syzkaller kern.wNov 9 16:15:56 Nov 9 16:15:56 syzkaller kern.warn kernel: [ 306.645711][T10417] R13: 00000000Nov 9 16:15:56 Nov 9 16:15:56 syzkaller kern.notice kernel: [ 306.791526][T10421] FAULT_INJECTION: forcing a failure. Nov 9 16:15:56 syzkaller kern.notice kernel: [ 306.791526][T10421] name failslab, interval 1, probability 0, space 0, times 0 Nov 9 16:15:56 syzkaller kern.warn kernel: [ 306.840148][T10421] CPU: 1 UID: 0 PID: 10421 Comm: syz.3.1512 Not tainted 6.12.0-rc6-syzkaller-00272-gda4373fbcf00 #0 Nov 9 16:15:56 syzkaller kern.warn kernel: [ 306.851633][T10421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 Nov 9 16:15:56 syzkaller kern.warn kernel: [ 306.861677][T10421] Call Trace: Nov 9 16:15:56 syzkaller kern.warn kernel: [ 306.864937][T10421] Nov 9 16:15:56 syzkaller kern.warn kernel: [ 306.867849][T10421] dump_stack_lvl+0x16c/0x1f0 Nov 9 16:15:56 syzkaller kern.warn kernel: [ 306.872533][T10421] should_fail_ex+0x497/0x5b0 Nov 9 16:15:56 syzkaller kern.warn kernel: [ 306.877205][T10421] ? fs_reclaim_acquire+0xae/0x150 Nov 9 16:15:56 syzkaller kern.warn kernel: [ 306.882324][T10421] should_failslab+0xc2/0x120 Nov 9 16:15:56 syzkaller kern.warn kernel: [ 306.887023][T10421] kmem_cache_alloc_noprof+0x6e/0x2f0 Nov 9 16:15:56 syzkaller kern.warn kernel: [ 306.892378][T10421] ? vm_area_dup+0x53/0x2f0 Nov 9 16:Nov 9 16:15:56 Nov 9 16:15:56 syzkaller kern.warn kernel: [ 306.930104][T1042Nov 9 16:15:56 syzkaller kern.wNov 9 16:15:56 syzkaller kern.wNov 9 16:15:56 syzkaller kern.warn kernel: [ 3Nov 9 16:15:56 syzkaller kern.warn kernel: [ 306.965427][T1042Nov 9 16:15:56 Nov 9 16:15:56 syzkaller kern.warn kernel: [ 306.994658][T1042Nov 9 16:15:56 Nov 9 16:15:56 syzkaller kern.notice kernel: [ 307.217005][T10435] FAULT_INJECTION: forcing a failure. Nov 9 16:15:56 syzkaller kern.notice kernel: [ 307.217005][T10435] name fail_usercopy, interval 1, probability 0, space 0, times 0 Nov 9 16:15:56 syzkaller kern.warn kernel: [ 307.232325][T10435] CPU: 1 UID: 0 PID: 10435 Comm: syz.0.1518 Not tainted 6.12.0-rc6-syzkaller-00272-gda4373fbcf00 #0 Nov 9 16:15:56 syzkaller kern.warn kernel: [ 307.243696][T10435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 Nov 9 16:15:56 syzkaller kern.warn kernel: [ 307.253757][T10435] Call Trace: Nov 9 16:15:56 syzkaller kern.warn kernel: [ 307.257050][T10435] Nov 9 16:15:56 syzkaller kern.warn kernel: [ 307.259982][T10435] dump_stack_lvl+0x16c/0x1f0 Nov 9 16:15:56 syzkaller kern.warn kernel: [ 307.264666][T10435] should_fail_ex+0x497/0x5b0 Nov 9 16:15:56 syzkaller kern.warn kernel: [ 307.269352][T10435] _copy_from_user+0x2e/0xd0 Nov 9 16:15:56 syzkaller kern.warn kernel: [ 307.273951][T10435] kstrtouint_from_user+0xd7/0x1c0 Nov 9 16:15:56 syzkaller kern.warn kernel: [ 307.279076][T10435] ? __pfx_kstrtouint_from_user+0x10/0x10 Nov 9 16:15:56 syzkaller kern.warn kernel: [ 3Nov 9 16:15:56 Nov 9 16:15:56 Nov 9 16:15:56 syzkaller kern.wNov 9 16:15:56 Nov 9 16:15:56 syzkaller kern.wNov 9 16:15:56 Nov 9 16:15:56 Nov 9 16:15:56 syzkaller kern.wNov 9 16:15:56 Nov 9 16:15:56 Nov 9 16:15:56 Nov 9 16:15:56 syzkaller kern.wNov 9 16:15:56 Nov 9 16:15:56 syzkaller kern.warn kernel: [ 3Nov 9 16:15:56 syzkaller kern.warn kernel: [ 307.493976][T10439] netlink: 'syz.0.1519': attribute type 29 has an invalid length. Nov 9 16:15:56 syzkaller kern.warn kernel: [ 307.510330][T10440] netlink: 'syz.0.1519': attribute type 29 has an invalid length. [ 308.079784][T10457] bridge0: port 3(veth0_to_bridge) entered blocking state [ 308.090781][T10457] bridge0: port 3(veth0_to_bridge) entered disabled state Nov 9 16:15:57 syzkaller kern.info kernel: [ 308.079784][T1045[ 308.103494][T10457] veth0_to_bridge: entered allmulticast mode 7] bridge0: port[ 308.111803][T10457] veth0_to_bridge: entered promiscuous mode 3(veth0_to_bridge) entered blocking state Nov 9 16:15:57 syzkaller kern.info kernel: [ 308.0[ 308.126645][T10457] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) 90781][T10457] bridge0: port 3(v[ 308.141996][T10457] bridge0: port 3(veth0_to_bridge) entered blocking state eth0_to_bridge) [ 308.149515][T10457] bridge0: port 3(veth0_to_bridge) entered forwarding state entered disabled state Nov 9 16:15:57 syzkaller kern.info kernel: [ 308.103494][T10457] veth0_to_bridge: entered allmulticast mode Nov 9 16:15:57 syzkaller kern.info kernel: [ 308.111803][T10457] veth0_to_bridge: entered promiscuous mode Nov 9 16:15:57 syzkaller kern.warn kernel: [ 308.126645][T10457] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) Nov 9 16:15:57 syzkaller kern.info kernel: [ 308.141996][T10457] bridge0: port 3(veth0_to_bridge) entered blocking state Nov 9 16:15:57 syzkaller kern.info kernel: [ 308.149515][T10457] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 308.341079][T10469] FAULT_INJECTION: forcing a failure. [ 308.341079][T10469] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 308.355483][T10469] CPU: 0 UID: 0 PID: 10469 Comm: syz.1.1530 Not tainted 6.12.0-rc6-syzkaller-00272-gda4373fbcf00 #0 [ 308.366240][T10469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 308.376276][T10469] Call Trace: [ 308.379543][T10469] [ 308.382452][T10469] dump_stack_lvl+0x16c/0x1f0 [ 308.387117][T10469] should_fail_ex+0x497/0x5b0 [ 308.391775][T10469] _copy_from_user+0x2e/0xd0 [ 308.396342][T10469] kstrtouint_from_user+0xd7/0x1c0 [ 308.401446][T10469] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 308.407147][T10469] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 308.412757][T10469] proc_fail_nth_write+0x84/0x250 [ 308.417768][T10469] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 308.423382][T10469] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 308.429003][T10469] vfs_write+0x24c/0x1150 [ 308.433325][T10469] ? __fget_files+0x23a/0x3f0 [ 308.437980][T10469] ? fdget_pos+0x24c/0x360 [ 308.442380][T10469] ? __pfx_lock_release+0x10/0x10 [ 308.447376][T10469] ? trace_lock_acquire+0x14a/0x1d0 [ 308.452551][T10469] ? __pfx_vfs_write+0x10/0x10 [ 308.457292][T10469] ? __pfx___mutex_lock+0x10/0x10 [ 308.462304][T10469] ? __fget_files+0x244/0x3f0 [ 308.466964][T10469] ksys_write+0x12f/0x260 [ 308.471273][T10469] ? __pfx_ksys_write+0x10/0x10 [ 308.476107][T10469] do_syscall_64+0xcd/0x250 [ 308.480595][T10469] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 308.486465][T10469] RIP: 0033:0x7f6380d7d1ff [ 308.490855][T10469] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48 [ 308.510454][T10469] RSP: 002b:00007f637f1f6030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 308.518857][T10469] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6380d7d1ff [ 308.526806][T10469] RDX: 0000000000000001 RSI: 00007f637f1f60a0 RDI: 0000000000000003 [ 308.534763][T10469] RBP: 00007f637f1f6090 R08: 0000000000000000 R09: 0000000000000000 [ 308.542745][T10469] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 308.550697][T10469] R13: 0000000000000000 R14: 00007f6380f35f80 R15: 00007ffc0cd244c8 [ 308.558661][T10469] Nov 9 16:15:57 syzkaller kern.notice kernel: [ 308.341079][T10469] FAULT_INJECTION: forcing a failure. Nov 9 16:15:57 syzkaller kern.notice kernel: [ 308.341079][T10469] name fail_usercopy, interval 1, probability 0, space 0, times 0 Nov 9 16:15:57 syzkaller kern.warn kernel: [ 308.355483][T10469] CPU: 0 UID: 0 PID: 10469 Comm: syz.1.1530 Not tainted 6.12.0-rc6-syzkaller-00272-gda4373fbcf00 #0 Nov 9 16:15:57 syzkaller kern.warn kernel: [ 308.366240][T10469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 Nov 9 16:15:57 syzkaller kern.warn kernel: [ 308.376276][T10469] Call Trace: Nov 9 16:15:57 syzkaller kern.warn kernel: [ 308.379543][T10469] Nov 9 16:15:57 syzkaller kern.warn kernel: [ 308.382452][T10469] dump_stack_lvl+0x16c/0x1f0 Nov 9 16:15:57 syzkaller kern.warn kernel: [ 308.387117][T10469] should_fail_ex+0x497/0x5b0 Nov 9 16:15:57 syzkaller kern.warn kernel: [ 308.391775][T10469] _copy_from_user+0x2e/0xd0 Nov 9 16:15:57 syzkaller kern.warn kernel: [ 308.396342][T10469] kstrtouint_from_user+0xd7/0x1c0 Nov 9 16:15:57 syzkaller kern.warn kernel: [ 308.401446][T10469] ? __pfx_kstrtouint_from_user+0x10/0x10 Nov 9 16:15:57 syzkaller kern.warn kernel: [ 308.407147][T10469] ? __pfx_lock_acquire.part.0+0x10/0x10 Nov [ 308.687023][T10471] syzkaller0: entered promiscuous mode 9 16:15:57 syzka[ 308.693851][T10471] syzkaller0: entered allmulticast mode ller kern.warn kernel: [ 308.412757][T10469] proc_fail_nth_write+0x84/0x250 Nov 9 16:15:57 syzkaller kern.warn kernel: [ 308.417768][T10469] ? __pfx_proc_fail_nth_write+0x10/0x10 Nov 9 16:15:57 syzkaller kern.warn kernel: [ 308.423382][T10469] ? __pfx_proc_fail_nth_write+0x10/0x10 Nov 9 16:15:57 syzkaller kern.warn kernel: [ 308.429003][T10469] vfs_write+0x24c/0x1150 Nov 9 16:15:57 syzkaller kern.warn kernel: [ 308.433325][T10469] ? __fget_files+0x23a/0x3f0 Nov 9 16:15:57 syzkaller kern.warn kernel: [ 308.437980][T10469] ? fdget_pos+0x24c/0x360 Nov 9 16:15:57 syzkaller kern.warn kernel: [ 308.442380][T10469] ? __pfx_lock_release+0x10/0x10 Nov 9 16:15:57 syzkaller kern.warn kernel: [ 308.447376][T10469] ? trace_lock_acquire+0x14a/0x1d0 Nov 9 16:15:57 syzkaller kern.warn kernel: [ 308.452551][T10469] ? __pfx_vfs_write+0x10/0x10 Nov 9 16:15:57 syzkaller kern.warn kernel: [ 308.457292][T10469] ? __pfx___mutex_lock+0x10/0x10 Nov 9 16:15:57 syzkaller kern.warn kernel: [ 308.462304][T10469] ? __fget_files+0x244/0x3f0 Nov 9 16:15:57 syzkaller kern.warn kernel: [ 308.466964][T10469] ksys_write+0x12f/0x260 Nov 9 16:15:57 syzkall[ 308.802599][T10487] FAULT_INJECTION: forcing a failure. [ 308.802599][T10487] name failslab, interval 1, probability 0, space 0, times 0 er kern.warn kernel: [ 308.471273][T10469] ? __pfx_ksys_write+0x10/0x10 Nov 9 16:15:57 syzkaller kern.warn kernel: [ 308.476107][T10469] do_syscall_64+0xcd/0x250 Nov 9 16:15:57 syzkaller kern.warn kernel: [ 308.480595][T10469] entry_SYSCALL_64_after_hwframe+0x77/0x7f Nov 9 16:15:57 syzkaller kern.warn kernel: [ 308.486465][T10469] RIP: 0033:0x7f6380d7d1ff Nov 9 16:15:57 syzkaller kern.warn kernel: [ 308.490855][T10469] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 [ 308.858689][T10487] CPU: 0 UID: 0 PID: 10487 Comm: syz.4.1536 Not tainted 6.12.0-rc6-syzkaller-00272-gda4373fbcf00 #0 00 48 8b 54 24 1[ 308.869862][T10487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 8 48 8b 74 24 10[ 308.881278][T10487] Call Trace: 41 89 c0 8b 7c [ 308.885923][T10487] 24 08 b8 01 00 0[ 308.890232][T10487] dump_stack_lvl+0x16c/0x1f0 0 00 0f 05 <48> [ 308.896261][T10487] should_fail_ex+0x497/0x5b0 [ 308.902301][T10487] ? fs_reclaim_acquire+0xae/0x150 3d 00 f0 ff ff 7[ 308.907414][T10487] should_failslab+0xc2/0x120 7 31 44 89 c7 48[ 308.913451][T10487] kmem_cache_alloc_node_noprof+0x71/0x310 89 44 24 08 e8 [ 308.920689][T10487] ? __alloc_skb+0x2b1/0x380 1c 8e 02 00 48 [ 308.926632][T10487] __alloc_skb+0x2b1/0x380 Nov 9 16:15:57 [ 308.932393][T10487] ? __pfx___alloc_skb+0x10/0x10 syzkaller kern.w[ 308.938685][T10487] ? __pfx_netlink_autobind.isra.0+0x10/0x10 arn kernel: [ 3[ 308.946018][T10487] netlink_alloc_large_skb+0x69/0x130 08.510454][T1046[ 308.952738][T10487] netlink_sendmsg+0x689/0xd70 9] RSP: 002b:000[ 308.958852][T10487] ? __pfx_netlink_sendmsg+0x10/0x10 07f637f1f6030 EF[ 308.965493][T10487] ____sys_sendmsg+0xaaf/0xc90 LAGS: 00000293 O[ 308.971599][T10487] ? copy_msghdr_from_user+0x10b/0x160 RIG_RAX: 0000000[ 308.978406][T10487] ? __pfx_____sys_sendmsg+0x10/0x10 000000001 Nov [ 308.985069][T10487] ? __pfx___lock_acquire+0x10/0x10 9 16:15:57 syzka[ 308.991612][T10487] ___sys_sendmsg+0x135/0x1e0 ller kern.warn k[ 308.997641][T10487] ? __pfx____sys_sendmsg+0x10/0x10 ernel: [ 308.51[ 309.004197][T10487] ? lock_acquire+0x2f/0xb0 8857][T10469] RA[ 309.010039][T10487] ? __fget_files+0x40/0x3f0 X: fffffffffffff[ 309.015986][T10487] ? fdget+0x176/0x210 fda RBX: 0000000[ 309.021492][T10487] __sys_sendmsg+0x117/0x1f0 000000000 RCX: 0[ 309.027427][T10487] ? __pfx___sys_sendmsg+0x10/0x10 0007f6380d7d1ff[ 309.033886][T10487] ? __fget_files+0x244/0x3f0 Nov 9 16:15:57[ 309.039929][T10487] do_syscall_64+0xcd/0x250 syzkaller kern.[ 309.045771][T10487] entry_SYSCALL_64_after_hwframe+0x77/0x7f warn kernel: [ [ 309.053011][T10487] RIP: 0033:0x7fe27217e719 308.526806][T104[ 309.058799][T10487] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 69] RDX: 0000000[ 309.079757][T10487] RSP: 002b:00007fe273018038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 000000001 RSI: 0[ 309.089517][T10487] RAX: ffffffffffffffda RBX: 00007fe272335f80 RCX: 00007fe27217e719 0007f637f1f60a0 [ 309.098929][T10487] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 RDI: 00000000000[ 309.108255][T10487] RBP: 00007fe273018090 R08: 0000000000000000 R09: 0000000000000000 00003 Nov 9 16[ 309.117580][T10487] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 :15:57 syzkaller[ 309.126907][T10487] R13: 0000000000000000 R14: 00007fe272335f80 R15: 00007ffcbc7bb338 kern.warn kerne[ 309.136244][T10487] l: [ 308.534763][T10469] RBP: 00007f637f1f6090 R08: 0000000000000000 R09: 0000000000000000 Nov 9 16:15:57 syzkaller kern.warn kernel: [ 308.542745][T10469] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 Nov 9 16:15:57 syzkaller ker[ 309.170520][ T29] kauditd_printk_skb: 455 callbacks suppressed n.warn kernel: [[ 309.170534][ T29] audit: type=1400 audit(1731168958.483:7907): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 308.550697][T10469] R13: 0000000000000000 R14: 00007f6380f35f80 R15: 00007ffc0cd244c8 Nov 9 16:15:57 syzkaller kern.warn kernel: [ 308.558661][T10469] Nov 9 16:15:58 syzkaller kern.info kernel: [ 308.687023][T10471] syzkaller0: entered promiscuous mode Nov 9 16:15:58 s[ 309.225027][ T29] audit: type=1400 audit(1731168958.533:7908): avc: denied { read write } for pid=5834 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 yzkaller kern.in[ 309.251185][ T29] audit: type=1400 audit(1731168958.543:7909): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 fo kernel: [ 30[ 309.274480][ T29] audit: type=1400 audit(1731168958.543:7910): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 8.693851][T10471[ 309.297398][ T29] audit: type=1400 audit(1731168958.543:7911): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ] syzkaller0: en[ 309.320654][ T29] audit: type=1400 audit(1731168958.543:7912): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tered allmultica[ 309.344349][ T29] audit: type=1400 audit(1731168958.543:7913): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 st mode Nov 9 [ 309.367812][ T29] audit: type=1400 audit(1731168958.543:7914): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 16:15:58 syzkall[ 309.391011][ T29] audit: type=1400 audit(1731168958.543:7915): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 er kern.notice k[ 309.414190][ T29] audit: type=1400 audit(1731168958.543:7916): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ernel: [ 308.802599][T10487] FAULT_INJECTION: forcing a failure. Nov 9 16:15:58 syzkaller kern.notice kernel: [ 308.802599][T10487] name failslab, interval 1, probability 0, space 0, times 0 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 308.858689][T10487] CPU: 0 UID: 0 PID: 10487 Comm: syz.4.1536 Not tainted 6.12.0-rc6-syzkaller-00272-gda4373fbcf00 #0 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 308.869862][T10487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 308.881278][T10487] Call Trace: Nov 9 16:15:58 syzkaller kern.warn kernel: [ 308.885923][T10487] Nov 9 16:15:58 syzkaller kern.warn kernel: [ 308.890232][T10487] dump_stack_lvl+0x16c/0x1f0 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 308.896261][T10487] should_fail_ex+0x497/0x5b0 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 308.902301][T10487] ? fs_reclaim_acquire+0xae/0x150 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 308.907414][T10487] should_failslab+0xc2/0x120 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 308.913451][T10487] kmem_cache_alloc_node_noprof+0x71/0x310 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 308.920689][T10487] ? __alloc_skb+0x2b1/0x380 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 308.926632][T10487] __alloc_skb+0x2b1/0x380 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 308.932393][T10487] ? __pfx___alloc_skb+0x10/0x10 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 308.938685][T10487] ? __pfx_netlink_autobind.isra.0+0x10/0x10 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 308.946018][T10487] netlink_alloc_large_skb+0x69/0x130 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 308.952738][T10487] netlink_sendmsg+0x689/0xd70 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 308.958852][T10487] ? __pfx_netlink_sendmsg+0x10/0x10 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 308.965493][T10487] ____sys_sendmsg+0xaaf/0xc90 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 308.971599][T10487] ? copy_msghdr_from_user+0x10b/0x160 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 308.978406][T10487] ? __pfx_____sys_sendmsg+0x10/0x10 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 308.985069][T10487] ? __pfx___lock_acquire+0x10/0x10 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 308.991612][T10487] ___sys_sendmsg+0x135/0x1e0 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 308.997641][T10487] ? __pfx____sys_sendmsg+0x10/0x10 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 309.004197][T10487] ? lock_acquire+0x2f/0xb0 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 309.010039][T10487] ? __fget_files+0x40/0x3f0 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 309.015986][T10487] ? fdget+0x176/0x210 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 309.021492][T10487] __sys_sendmsg+0x117/0x1f0 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 309.027427][T10487] ? __pfx___sys_sendmsg+0x10/0x10 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 309.033886][T10487] ? __fget_files+0x244/0x3f0 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 309.039929][T10487] do_syscall_64+0xcd/0x250 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 309.045771][T10487] entry_SYSCALL_64_after_hwframe+0x77/0x7f Nov 9 16:15:58 syzkaller kern.warn kernel: [ 309.053011][T10487] RIP: 0033:0x7fe27217e719 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 309.058799][T10487] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 309.079757][T10487] RSP: 002b:00007fe273018038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e Nov 9 16:15:58 syzkaller kern.warn kernel: [ 309.089517][T10487] RAX: ffffffffffffffda RBX: 00007fe272335f80 RCX: 00007fe27217e719 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 309.098929][T10487] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 309.108255][T10487] RBP: 00007fe273018090 R08: 0000000000000000 R09: 0000000000000000 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 309.117580][T10487] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 309.126907][T10487] R13: 0000000000000000 R14: 00007fe272335f80 R15: 00007ffcbc7bb338 Nov 9 16:15:58 syzkaller kern.warn kernel: [ 309.136244][T10487] Nov 9 16:15:58 syzkaller kern.warn kernel: [ 309.170520][ T29] kauditd_printk_skb: 455 callbacks suppressed Nov 9 16:15:58 syzkaller kern.notice kernel: [ 309.170534][ T29] audit: type=1400 audit(1731168958.483:7907): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 9 16:15:58 syzkaNov 9 16:15:58 Nov 9 16:15:58 [ 311.685881][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.698178][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.710684][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.722931][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.735189][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.747431][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.759703][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:01 [ 311.773233][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) syzkaller kern.w[ 311.786720][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) arn kernel: [ 3[ 311.800100][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 11.685881][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:01 syzkaller kern.warn kernel: [ 311.698178][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:01 syzkaller kern.warn kernel: [ 311.710684][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:01 syzkaller kern.warn kernel: [ 311.722931][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:01 syzkaller kern.warn kernel: [ 311.735189][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:01 syzkaller kern.warn kernel: [ 311.747431][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:01 syzkaller kern.warn kernel: [ 311.759703][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:01 syzkaller kern.warn kernel: [ 311.773233][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:01 syzkaller kern.warn kernel: [ 311.786720][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:01 syzkaller kern.warn kernel: [ 311.800100][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 313.123111][T10553] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1556'. Nov 9 16:16:02 syzkaller kern.warn kernel: [ 313.123111][T10553] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1556'. [ 314.182090][ T29] kauditd_printk_skb: 191 callbacks suppressed [ 314.182106][ T29] audit: type=1400 audit(1731168963.493:8108): avc: denied { bpf } for pid=10570 comm="syz.2.1561" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 Nov 9 16:16:03 syzkaller kern.warn kernel: [ 314.182090][ T2[ 314.219818][ T29] audit: type=1400 audit(1731168963.533:8109): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_printk_skb: 191 callbacks suppressed Nov 9 16:16:03 syzkaller kern.[ 314.249058][ T29] audit: type=1400 audit(1731168963.533:8110): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 notice kernel: [ 314.182106][ T29] audit: type=1400 audit(1731168963.493:8108): avc: denied { bpf } for pid=10570 comm="syz.2.1561" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permiss Nov 9 16:16:03 syzkaller kern.notice kernel: [ 314.219818][ T29] audit: type=1400 audit(1731168963.533:8109): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 9 16:16:03 syzkaller kern.notice k[ 314.319525][ T29] audit: type=1400 audit(1731168963.533:8111): avc: denied { read write } for pid=10570 comm="syz.2.1561" name="qrtr-tun" dev="devtmpfs" ino=1307 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 ernel: [ 314.249058][ T29] audit: type=1400 audit(1731168963.533:8110): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 9 16:16:03 syzkaller kern.notice kernel: [ 31[ 314.368471][ T29] audit: type=1400 audit(1731168963.533:8112): avc: denied { create } for pid=10570 comm="syz.2.1561" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 4.319525][ T29] audit: type=1400 audit(1731168963.533:8111): avc: denied { read write } for pid=10570 comm=[ 314.399653][ T29] audit: type=1400 audit(1731168963.533:8113): avc: denied { prog_load } for pid=10570 comm="syz.2.1561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 "syz.2.1561" name="qrtr-tun" dev="devtmpfs" ino=1307 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r Nov 9 16:16:03[ 314.430269][ T29] audit: type=1400 audit(1731168963.563:8114): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.notice kernel: [ 314.368471][ T29] audit: typ[ 314.457856][ T29] audit: type=1400 audit(1731168963.603:8115): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 e=1400 audit(1731168963.533:8112): avc: denied { create } for pid=10570 comm=[ 314.486885][ T29] audit: type=1400 audit(1731168963.613:8116): avc: denied { read write } for pid=5827 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 "syz.2.1561" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysa[ 314.519076][ T29] audit: type=1400 audit(1731168963.613:8117): avc: denied { read } for pid=10570 comm="syz.2.1561" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 dm_t tclass=anon_in Nov 9 16:16:03 syzkaller kern.notice kernel: [ 314.399653][ T29] audit: type=1400 audit(1731168963.533:8113): avc: denied { prog_load } for pid=10570 comm="syz.2.1561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Nov 9 16:16:03 syzkaller kern.notice kernel: [ 314.430269][ T29] audit: type=1400 audit(1731168963.563:8114): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 9 16:16:03 syzkaller kern.notice kernel: [ 314.457856][ T29] audit: type=1400 audit(1731168963.603:8115): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 9 16:16:03 syzkaller kern.notice kernel: [ 314.486885][ T29] audit: type=1400 audit(1731168963.613:8116): avc: denied { read write } for pid=5827 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 9 16:16:03 syzkaller kern.notice kernel: [ 314.519076][ T29] audit: type=1400 audit(1731168963.613:8117): avc: denied { read } for pid=10570 comm="syz.2.1561" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t [ 316.692257][ C1] net_ratelimit: 36431 callbacks suppressed [ 316.692277][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.710490][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.722722][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.722894][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.723112][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.723274][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.723509][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.723665][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.723883][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.724054][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:06 syzkaller kern.warn kernel: [ 316.692257][ C1] net_ratelimit: 36431 callbacks suppressed No[ 316.867174][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 v 9 16:16:06 syzkaller kern.war[ 316.875900][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 n kernel: [ 316.692277][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:06 syzkaller kern.warn kernel: [ 316.710490][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:06 syzkaller kern.warn kernel: [ 316.722722][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:06 syzkaller kern.warn kernel: [ 316.722894][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:06 syzkaller kern.warn kernel: [ 316.723112][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:06 syzkaller kern.warn kernel: [ 316.723274][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:06 syzkaller kern.warn kernel: [ 316.723509][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:06 syzkaller kern.warn kernel: [ 316.723665][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:06 syzkaller kern.warn kernel: [ 316.723883][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:06 syzkaller kern.warn kernel: [ 316.724054][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:06 syzkaller kern.warn kernel: [ 316.867174][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 Nov 9 16:16:06 syzkaller kern.warn kernel: [ 316.875900][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 [ 319.716948][ T29] kauditd_printk_skb: 41 callbacks suppressed [ 319.716963][ T29] audit: type=1400 audit(1731168969.033:8159): avc: denied { read write } for pid=5828 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Nov 9 16:16:09 syzkaller kern.warn kernel: [ 319.716948][ T29] kauditd_printk_skb: 41 callbacks suppressed Nov 9 16:16:09 syzkaller kern.notice kernel: [ 319.716963][ T29] audit: type=1400 audit(1731168969.033:8159): avc: denied { read write } for pid=5828 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 319.824813][ T29] audit: type=1400 audit(1731168969.093:8160): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 9 16:16:09 syzkaller kern.notice kernel: [ 319.824813][ T29] audit: type=1400 audit(1731168969.093:8160): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 319.918222][ T29] audit: type=1400 audit(1731168969.093:8161): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 9 16:16:09 syzkaller kern.notice kernel: [ 319.918222][ T29] audit: type=1400 audit(1731168969.093:8161): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 319.989495][ T29] audit: type=1400 audit(1731168969.123:8162): avc: denied { write } for pid=10587 comm="syz.2.1567" name="001" dev="devtmpfs" ino=750 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 Nov 9 16:16:09 syzkaller kern.notice kernel: [ 319.989495][ T29] audit: type=1400 audit(1731168969.123:8162): avc: denied { write } for pid=10587 comm="syz.2.1567" name="001" dev="devtmpfs" ino=750 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device [ 320.072275][ T29] audit: type=1400 audit(1731168969.123:8163): avc: denied { create } for pid=10587 comm="syz.2.1567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 Nov 9 16:16:09 syzkaller kern.notice kernel: [ 320.072275][ T29] audit: type=1400 audit(1731168969.123:8163): avc: denied { create } for pid=10587 comm="syz.2.1567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 320.143701][ T29] audit: type=1400 audit(1731168969.123:8164): avc: denied { prog_load } for pid=10587 comm="syz.2.1567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Nov 9 16:16:09 syzkaller kern.notice kernel: [ 320.143701][ T29] audit: type=1400 audit(1731168969.123:8164): avc: denied { prog_load } for pid=10587 comm="syz.2.1567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 320.195173][ T29] audit: type=1400 audit(1731168969.123:8165): avc: denied { execmem } for pid=10587 comm="syz.2.1567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Nov 9 16:16:09 syzkaller kern.notice kernel: [ 320.195173][ T29] audit: type=1400 audit(1731168969.123:8165): avc: denied { execmem } for pid=10587 comm="syz.2.1567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 320.246302][ T29] audit: type=1400 audit(1731168969.123:8166): avc: denied { create } for pid=10587 comm="syz.2.1567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 Nov 9 16:16:09 syzkaller kern.notice kernel: [ 320.246302][ T29] audit: type=1400 audit(1731168969.123:8166): avc: denied { create } for pid=10587 comm="syz.2.1567" scon[ 320.296528][ T29] audit: type=1400 audit(1731168969.133:8167): avc: denied { create } for pid=10587 comm="syz.2.1567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 text=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 Nov 9 16:16:09 syzkaller kern.notice kernel: [ 320.296528][ T29] audit: type=1400 audit(1731168969.133:8167): avc: denied { create } for pid=10587 comm="syz.2.1567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm[ 320.347000][ T29] audit: type=1400 audit(1731168969.143:8168): avc: denied { mounton } for pid=10587 comm="syz.2.1567" path="/318/bus" dev="tmpfs" ino=1689 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 _r:sysadm_t tclass=rawip_socket permissive=0 Nov 9 16:16:09 syzkaller kern.notice kernel: [ 320.347000][ T29] audit: type=1400 audit(1731168969.143:8168): avc: denied { mounton } for pid=10587 comm="syz.2.1567" path="/318/bus" dev="tmpfs" ino=1689 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpf [ 321.702282][ C1] net_ratelimit: 36080 callbacks suppressed [ 321.702301][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.720496][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:11 [ 321.732833][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) syzkaller kern.w[ 321.746312][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) arn kernel: [ 3[ 321.759607][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 21.702282][ C[ 321.772935][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 1] net_ratelimit[ 321.786317][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) : 36080 callback[ 321.799617][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) s suppressed No[ 321.812961][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) v 9 16:16:11 sy[ 321.826281][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) zkaller kern.warn kernel: [ 321.702301][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:11 syzkaller kern.warn kernel: [ 321.720496][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:11 syzkaller kern.warn kernel: [ 321.732833][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:11 syzkaller kern.warn kernel: [ 321.746312][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:11 syzkaller kern.warn kernel: [ 321.759607][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:11 syzkaller kern.warn kernel: [ 321.772935][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:11 syzkaller kern.warn kernel: [ 321.786317][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:11 syzkaller kern.warn kernel: [ 321.799617][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:11 syzkaller kern.warn kernel: [ 321.812961][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:11 syzkaller kern.warn kernel: [ 321.826281][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.712225][ C0] net_ratelimit: 51878 callbacks suppressed [ 326.712246][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 326.712298][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.718310][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 326.730252][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.742286][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 326.754242][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.766154][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 326.778051][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.790073][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 326.802026][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 329.355724][ T29] kauditd_printk_skb: 63 callbacks suppressed [ 329.355744][ T29] audit: type=1400 audit(1731168973.553:8232): avc: denied { read write } for pid=5834 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 329.410220][T10568] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1560'. [ 330.198995][ T29] audit: type=1400 audit(1731168978.743:8233): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 331.722200][ C1] net_ratelimit: 33960 callbacks suppressed [ 331.722220][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.722352][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 331.728258][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.740626][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 331.752280][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.764506][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 331.776034][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.788379][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 331.800199][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.812425][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 334.767772][ T16] sched: DL replenish lagged too much [ 336.732189][ C1] net_ratelimit: 33511 callbacks suppressed [ 336.732209][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.732344][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 336.738377][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.750654][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 336.762235][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.774545][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 336.786191][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.798383][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 336.809973][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.822415][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 341.742300][ C1] net_ratelimit: 35930 callbacks suppressed [ 341.742319][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.742775][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 341.748434][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.760791][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 341.772430][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.784639][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 341.796222][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.808550][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 341.820187][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.832428][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 346.752171][ C1] net_ratelimit: 36014 callbacks suppressed [ 346.752190][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.752377][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 346.758282][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.770535][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 346.782077][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.794664][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 346.806308][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.818512][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 346.830092][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.842441][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 351.762144][ C1] net_ratelimit: 35811 callbacks suppressed [ 351.762164][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.762575][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 351.768199][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.780596][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 351.792240][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.804424][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 351.816011][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.828550][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 351.840175][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.852406][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 356.772148][ C0] net_ratelimit: 35109 callbacks suppressed [ 356.772166][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 356.772226][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.778612][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 356.790171][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.802565][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 356.814144][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.826363][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 356.837926][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.850526][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 356.861945][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Nov 9 16:16:18 syzkaller kern.warn kernel: [ 326.712225][ C0] net_ratelimit: 51878 callbacks suppressed [ 359.706913][ T29] audit: type=1400 audit(1731169008.913:8234): avc: denied { read } for pid=5187 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 361.782146][ C1] net_ratelimit: 33277 callbacks suppressed [ 361.782166][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.782345][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 361.788268][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.800488][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 361.812080][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.824416][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 361.836049][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.848259][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 361.859914][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.872450][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) Nov 9 16:16:18 syzkaller kern.warn kernel: [ 326.712246][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 366.792298][ C1] net_ratelimit: 32951 callbacks suppressed [ 366.792317][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.792348][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 366.798368][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.810705][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 366.822368][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.834570][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 366.846155][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.858483][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 366.870136][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.882339][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 371.802252][ C0] net_ratelimit: 33103 callbacks suppressed [ 371.802272][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 371.802304][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.808727][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 371.820310][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.832646][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 371.844302][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.856490][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 371.868090][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.880407][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 371.892069][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.812254][ C1] net_ratelimit: 32452 callbacks suppressed [ 376.812275][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.812377][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 376.818399][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.830601][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 376.842189][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.854598][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 376.866239][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.878765][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 376.890023][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.902378][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 381.822314][ C1] net_ratelimit: 32602 callbacks suppressed [ 381.822334][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.822391][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 381.828388][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.840831][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 381.852470][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.864675][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 381.876227][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.888581][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 381.900197][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.912422][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 386.832277][ C1] net_ratelimit: 32596 callbacks suppressed [ 386.832297][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.832603][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 386.838398][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.850614][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 386.862223][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.874586][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 386.886194][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.898385][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 386.909974][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.922348][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 391.842143][ C0] net_ratelimit: 32560 callbacks suppressed [ 391.842163][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 391.842176][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.842308][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.848560][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 391.860224][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.872549][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 391.884012][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.896332][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 391.907988][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.920589][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 396.852160][ C1] net_ratelimit: 35362 callbacks suppressed [ 396.852181][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.852613][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 396.858300][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.870650][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 396.882318][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.894529][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 396.906093][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.918445][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 396.930083][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.942297][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 401.862158][ C0] net_ratelimit: 35942 callbacks suppressed [ 401.862177][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 401.862182][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.862314][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.868592][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 401.880247][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.892739][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 401.904059][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.916385][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 401.927997][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.940286][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 406.872224][ C1] net_ratelimit: 35799 callbacks suppressed [ 406.872244][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.872592][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 406.878285][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.890671][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 406.902303][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.914512][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 406.926100][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.938438][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 406.950075][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.962301][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 411.882269][ C1] net_ratelimit: 35846 callbacks suppressed [ 411.882291][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 411.882463][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 411.888373][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 411.900608][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 411.912185][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 411.924510][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 411.936142][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 411.948324][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 411.959947][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 411.972301][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 416.892230][ C1] net_ratelimit: 35887 callbacks suppressed [ 416.892250][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.892466][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 416.898361][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.910572][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 416.922160][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.934484][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 416.946141][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.958337][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 416.969902][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.982253][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 421.902314][ C1] net_ratelimit: 35873 callbacks suppressed [ 421.902333][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.902580][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 421.908390][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.920748][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 421.932377][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.944575][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 421.956163][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.969023][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 421.980682][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.992884][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 426.912217][ C1] net_ratelimit: 35828 callbacks suppressed [ 426.912237][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.912328][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 426.918334][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.930561][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 426.942244][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.954603][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 426.966236][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.978418][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 426.990013][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.002374][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 431.922220][ C0] net_ratelimit: 35964 callbacks suppressed [ 431.922239][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 431.922283][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.928649][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 431.940254][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.952623][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 431.964257][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.976460][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 431.988059][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.000399][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 432.012038][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 435.132099][ C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 435.139074][ C1] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P5823/1:b..l P10519/2:b..l [ 435.148592][ C1] rcu: (detected by 1, t=10503 jiffies, g=28061, q=1722 ncpus=2) [ 435.156401][ C1] task:syz.1.1545 state:R running task stack:27536 pid:10519 tgid:10518 ppid:5836 flags:0x00004002 [ 435.169030][ C1] Call Trace: [ 435.172323][ C1] [ 435.175258][ C1] __schedule+0xe55/0x5740 [ 435.179704][ C1] ? __pfx___schedule+0x10/0x10 [ 435.184566][ C1] ? __pfx_mark_lock+0x10/0x10 [ 435.189348][ C1] preempt_schedule_irq+0x51/0x90 [ 435.194382][ C1] irqentry_exit+0x36/0x90 [ 435.198810][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 435.204801][ C1] RIP: 0010:lock_acquire.part.0+0x155/0x380 [ 435.210700][ C1] Code: b8 ff ff ff ff 65 0f c1 05 80 de 97 7e 83 f8 01 0f 85 d0 01 00 00 9c 58 f6 c4 02 0f 85 e5 01 00 00 48 85 ed 0f 85 b6 01 00 00 <48> b8 00 00 00 00 00 fc ff df 48 01 c3 48 c7 03 00 00 00 00 48 c7 [ 435.230324][ C1] RSP: 0018:ffffc9000320f738 EFLAGS: 00000206 [ 435.236402][ C1] RAX: 0000000000000046 RBX: 1ffff92000641ee8 RCX: 0000000000000001 [ 435.244379][ C1] RDX: 0000000000000001 RSI: ffffffff8b6cd340 RDI: ffffffff8bd1b3c0 [ 435.252351][ C1] RBP: 0000000000000200 R08: 0000000000000000 R09: fffffbfff2dc5d88 [ 435.260334][ C1] R10: ffffffff96e2ec47 R11: 0000000000000000 R12: 0000000000000000 [ 435.268314][ C1] R13: ffffffff8e1b8340 R14: 0000000000000000 R15: 0000000000000000 [ 435.276309][ C1] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 435.281948][ C1] ? rcu_is_watching+0x12/0xc0 [ 435.286717][ C1] ? trace_lock_acquire+0x14a/0x1d0 [ 435.291929][ C1] ? get_mem_cgroup_from_objcg+0x183/0x330 [ 435.297752][ C1] ? lock_acquire+0x2f/0xb0 [ 435.302265][ C1] ? get_mem_cgroup_from_objcg+0x183/0x330 [ 435.308102][ C1] get_mem_cgroup_from_objcg+0x197/0x330 [ 435.313751][ C1] ? get_mem_cgroup_from_objcg+0x183/0x330 [ 435.319571][ C1] ? free_unref_page+0x617/0xdc0 [ 435.324519][ C1] uncharge_folio+0x3a1/0x7c0 [ 435.329200][ C1] __mem_cgroup_uncharge+0x129/0x1d0 [ 435.334490][ C1] ? __pfx___mem_cgroup_uncharge+0x10/0x10 [ 435.340301][ C1] ? do_raw_spin_unlock+0x172/0x230 [ 435.345513][ C1] ? __page_cache_release+0x77f/0xe10 [ 435.350891][ C1] ? const_folio_flags+0x71/0x1f0 [ 435.355921][ C1] __folio_put+0x27c/0x3d0 [ 435.360341][ C1] ? __pfx___folio_put+0x10/0x10 [ 435.365296][ C1] ? refcount_dec_and_lock_irqsave+0x3b/0x120 [ 435.371384][ C1] ? free_uid+0xa7/0x200 [ 435.375644][ C1] ? __pfx_free_uid+0x10/0x10 [ 435.380337][ C1] put_page+0x21e/0x280 [ 435.384502][ C1] anon_pipe_buf_release+0x11a/0x240 [ 435.389794][ C1] free_pipe_info+0x1fa/0x3b0 [ 435.394484][ C1] pipe_release+0x2bf/0x320 [ 435.398995][ C1] ? __pfx_pipe_release+0x10/0x10 [ 435.404030][ C1] __fput+0x3f6/0xb60 [ 435.408037][ C1] task_work_run+0x14e/0x250 [ 435.412642][ C1] ? __pfx_task_work_run+0x10/0x10 [ 435.417854][ C1] ? do_raw_spin_unlock+0x172/0x230 [ 435.423066][ C1] do_exit+0xadd/0x2d70 [ 435.427235][ C1] ? get_signal+0x8f2/0x2770 [ 435.431830][ C1] ? __pfx_do_exit+0x10/0x10 [ 435.436428][ C1] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 435.441806][ C1] do_group_exit+0xd3/0x2a0 [ 435.446317][ C1] get_signal+0x25fb/0x2770 [ 435.450824][ C1] ? __pfx___sys_sendmmsg+0x10/0x10 [ 435.456026][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 435.461241][ C1] ? __pfx_get_signal+0x10/0x10 [ 435.466103][ C1] ? __pfx_do_futex+0x10/0x10 [ 435.470789][ C1] arch_do_signal_or_restart+0x90/0x7e0 [ 435.476346][ C1] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 435.482512][ C1] ? rcu_is_watching+0x12/0xc0 [ 435.487296][ C1] syscall_exit_to_user_mode+0x150/0x2a0 [ 435.492946][ C1] do_syscall_64+0xda/0x250 [ 435.497551][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 435.503462][ C1] RIP: 0033:0x7f6380d7e719 [ 435.507880][ C1] RSP: 002b:00007f637f1f6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 435.516302][ C1] RAX: 000000000000000b RBX: 00007f6380f35f80 RCX: 00007f6380d7e719 [ 435.524281][ C1] RDX: 0000000000000318 RSI: 00000000200bd000 RDI: 0000000000000004 [ 435.532257][ C1] RBP: 00007f6380df139e R08: 0000000000000000 R09: 0000000000000000 [ 435.540230][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 435.548207][ C1] R13: 0000000000000000 R14: 00007f6380f35f80 R15: 00007ffc0cd244c8 [ 435.556283][ C1] [ 435.559304][ C1] task:syz-executor state:R running task stack:25392 pid:5823 tgid:5823 ppid:5817 flags:0x00004004 [ 435.571062][ C1] Call Trace: [ 435.574337][ C1] [ 435.577271][ C1] __schedule+0xe55/0x5740 [ 435.581701][ C1] ? hlock_class+0x4e/0x130 [ 435.586213][ C1] ? __pfx___lock_acquire+0x10/0x10 [ 435.591417][ C1] ? __pfx_mark_lock+0x10/0x10 [ 435.596182][ C1] ? __pfx___schedule+0x10/0x10 [ 435.601041][ C1] ? find_held_lock+0x2d/0x110 [ 435.605821][ C1] ? preempt_schedule_thunk+0x1a/0x30 [ 435.611195][ C1] preempt_schedule_common+0x44/0xc0 [ 435.616495][ C1] preempt_schedule_thunk+0x1a/0x30 [ 435.621700][ C1] _raw_spin_unlock+0x3e/0x50 [ 435.626388][ C1] unmap_page_range+0xb01/0x3cf0 [ 435.631346][ C1] ? __pfx_unmap_page_range+0x10/0x10 [ 435.636717][ C1] ? mas_next_slot+0x12d3/0x21b0 [ 435.641658][ C1] ? uprobe_munmap+0x20/0x5c0 [ 435.646342][ C1] unmap_single_vma+0x194/0x2b0 [ 435.651197][ C1] unmap_vmas+0x22f/0x490 [ 435.655534][ C1] ? __pfx_unmap_vmas+0x10/0x10 [ 435.660389][ C1] ? __pfx_lock_release+0x10/0x10 [ 435.665416][ C1] ? lock_acquire+0x2f/0xb0 [ 435.669919][ C1] ? mlock_drain_local+0x6f/0x4f0 [ 435.674959][ C1] exit_mmap+0x1c6/0xb30 [ 435.679204][ C1] ? trace_contention_end+0xea/0x140 [ 435.684492][ C1] ? __pfx_exit_mmap+0x10/0x10 [ 435.689258][ C1] ? __mutex_lock+0x1a6/0x9c0 [ 435.693962][ C1] __mmput+0x12a/0x480 [ 435.698036][ C1] mmput+0x62/0x70 [ 435.701765][ C1] do_exit+0x9bf/0x2d70 [ 435.705931][ C1] ? get_signal+0x8f2/0x2770 [ 435.710524][ C1] ? __pfx_do_exit+0x10/0x10 [ 435.715121][ C1] ? do_raw_spin_lock+0x12d/0x2c0 [ 435.720144][ C1] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 435.725526][ C1] do_group_exit+0xd3/0x2a0 [ 435.730037][ C1] get_signal+0x25fb/0x2770 [ 435.734548][ C1] ? __pfx_child_wait_callback+0x10/0x10 [ 435.740190][ C1] ? __pfx_get_signal+0x10/0x10 [ 435.745045][ C1] ? __do_sys_wait4+0xd2/0x170 [ 435.749814][ C1] ? find_held_lock+0x2d/0x110 [ 435.754585][ C1] arch_do_signal_or_restart+0x90/0x7e0 [ 435.760137][ C1] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 435.766311][ C1] syscall_exit_to_user_mode+0x150/0x2a0 [ 435.771955][ C1] do_syscall_64+0xda/0x250 [ 435.776461][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 435.782385][ C1] RIP: 0033:0x7f6380d74953 [ 435.786801][ C1] RSP: 002b:00007ffc0cd24a18 EFLAGS: 00000202 ORIG_RAX: 000000000000003d [ 435.795218][ C1] RAX: fffffffffffffe00 RBX: 00000000000016cc RCX: 00007f6380d74953 [ 435.803193][ C1] RDX: 0000000040000000 RSI: 00007ffc0cd24a2c RDI: 00000000ffffffff [ 435.811171][ C1] RBP: 00007ffc0cd24a2c R08: 0000000000000000 R09: 0000000000000000 [ 435.819144][ C1] R10: 0000000000000000 R11: 0000000000000202 R12: 000000000000000c [ 435.827116][ C1] R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000 [ 435.835107][ C1] [ 435.838126][ C1] rcu: rcu_preempt kthread starved for 6244 jiffies! g28061 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 435.849232][ C1] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 435.859202][ C1] rcu: RCU grace-period kthread stack dump: [ 435.865084][ C1] task:rcu_preempt state:R running task stack:27008 pid:17 tgid:17 ppid:2 flags:0x00004000 [ 435.876840][ C1] Call Trace: [ 435.880120][ C1] [ 435.883052][ C1] __schedule+0xe55/0x5740 [ 435.887477][ C1] ? __pfx___lock_acquire+0x10/0x10 [ 435.892683][ C1] ? __pfx___schedule+0x10/0x10 [ 435.897539][ C1] ? schedule+0x298/0x350 [ 435.901873][ C1] ? __pfx_lock_release+0x10/0x10 [ 435.906896][ C1] ? trace_lock_acquire+0x14a/0x1d0 [ 435.912099][ C1] ? lock_acquire+0x2f/0xb0 [ 435.916596][ C1] ? schedule+0x1fd/0x350 [ 435.920934][ C1] schedule+0xe7/0x350 [ 435.925011][ C1] schedule_timeout+0x136/0x2a0 [ 435.929870][ C1] ? __pfx_schedule_timeout+0x10/0x10 [ 435.935251][ C1] ? __pfx_process_timeout+0x10/0x10 [ 435.940542][ C1] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 435.946355][ C1] ? prepare_to_swait_event+0xf3/0x470 [ 435.951816][ C1] rcu_gp_fqs_loop+0x1eb/0xb00 [ 435.956583][ C1] ? __pfx_rcu_gp_fqs_loop+0x10/0x10 [ 435.961865][ C1] ? rcu_gp_init+0xc82/0x1630 [ 435.966544][ C1] ? _raw_spin_unlock_irq+0x2e/0x50 [ 435.971753][ C1] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 435.977569][ C1] rcu_gp_kthread+0x271/0x380 [ 435.982251][ C1] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 435.987450][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 435.992657][ C1] ? __kthread_parkme+0x148/0x220 [ 435.997689][ C1] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 436.002899][ C1] kthread+0x2c1/0x3a0 [ 436.006976][ C1] ? _raw_spin_unlock_irq+0x23/0x50 [ 436.012189][ C1] ? __pfx_kthread+0x10/0x10 [ 436.016785][ C1] ret_from_fork+0x45/0x80 [ 436.021197][ C1] ? __pfx_kthread+0x10/0x10 [ 436.025795][ C1] ret_from_fork_asm+0x1a/0x30 [ 436.030575][ C1] [ 436.033590][ C1] rcu: Stack dump where RCU GP kthread last ran: [ 436.039912][ C1] CPU: 1 UID: 0 PID: 24 Comm: ksoftirqd/1 Not tainted 6.12.0-rc6-syzkaller-00272-gda4373fbcf00 #0 [ 436.050500][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 436.060554][ C1] RIP: 0010:__find_rr_leaf+0x2c7/0xe00 [ 436.066022][ C1] Code: 8e 3a 09 00 00 44 8b a3 90 00 00 00 44 8b 74 24 10 44 89 e7 44 89 f6 e8 c7 b9 c1 f7 45 39 f4 0f 85 11 05 00 00 e8 39 b8 c1 f7 <4c> 8d 63 64 4c 89 e0 48 c1 e8 03 0f b6 14 28 4c 89 e0 83 e0 07 83 [ 436.085809][ C1] RSP: 0018:ffffc900001e7378 EFLAGS: 00000246 [ 436.091880][ C1] RAX: 0000000000000000 RBX: ffff888032bed400 RCX: ffffffff89cbc309 [ 436.099852][ C1] RDX: ffff88801d6e8000 RSI: ffffffff89cbc317 RDI: 0000000000000004 [ 436.107823][ C1] RBP: dffffc0000000000 R08: 0000000000000004 R09: 0000000000000100 [ 436.115792][ C1] R10: 0000000000000100 R11: 0000000000000000 R12: 0000000000000100 [ 436.123763][ C1] R13: ffffc900001e7680 R14: 0000000000000100 R15: ffff888034ba14b8 [ 436.131733][ C1] FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 [ 436.140674][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 436.147270][ C1] CR2: 0000000020106030 CR3: 000000003605e000 CR4: 00000000003526f0 [ 436.155252][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 436.163226][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 436.171199][ C1] Call Trace: [ 436.174476][ C1] [ 436.177318][ C1] ? rcu_check_gp_kthread_starvation+0x31b/0x450 [ 436.183654][ C1] ? do_raw_spin_unlock+0x172/0x230 [ 436.188861][ C1] ? rcu_sched_clock_irq+0x23d7/0x32a0 [ 436.194336][ C1] ? __pfx_rcu_sched_clock_irq+0x10/0x10 [ 436.199971][ C1] ? find_held_lock+0x2d/0x110 [ 436.204765][ C1] ? update_process_times+0x178/0x220 [ 436.210148][ C1] ? __pfx_update_process_times+0x10/0x10 [ 436.215882][ C1] ? tick_nohz_handler+0x376/0x530 [ 436.220997][ C1] ? __pfx_tick_nohz_handler+0x10/0x10 [ 436.226459][ C1] ? __hrtimer_run_queues+0x5fb/0xae0 [ 436.231845][ C1] ? __pfx___hrtimer_run_queues+0x10/0x10 [ 436.237572][ C1] ? ktime_get_update_offsets_now+0x201/0x310 [ 436.243648][ C1] ? hrtimer_interrupt+0x31b/0x800 [ 436.248769][ C1] ? __sysvec_apic_timer_interrupt+0x10f/0x400 [ 436.254924][ C1] ? sysvec_apic_timer_interrupt+0x9f/0xc0 [ 436.260748][ C1] [ 436.263691][ C1] [ 436.266630][ C1] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 436.272811][ C1] ? __find_rr_leaf+0x2b9/0xe00 [ 436.277671][ C1] ? __find_rr_leaf+0x2c7/0xe00 [ 436.282528][ C1] ? __find_rr_leaf+0x2c7/0xe00 [ 436.287381][ C1] ? __find_rr_leaf+0x2c7/0xe00 [ 436.292234][ C1] ? __pfx___find_rr_leaf+0x10/0x10 [ 436.297439][ C1] ? fib6_node_lookup+0x125/0x180 [ 436.302466][ C1] ? __pfx_fib6_node_lookup+0x10/0x10 [ 436.307844][ C1] ? arch_stack_walk+0x74/0x100 [ 436.312713][ C1] fib6_table_lookup+0x57e/0xa30 [ 436.317673][ C1] ? __pfx_fib6_table_lookup+0x10/0x10 [ 436.323134][ C1] ? trace_lock_acquire+0x14a/0x1d0 [ 436.328355][ C1] ? lock_acquire+0x2f/0xb0 [ 436.332870][ C1] ? ip6_pol_route+0x186/0x1120 [ 436.337735][ C1] ip6_pol_route+0x1cd/0x1120 [ 436.342426][ C1] ? rt6_multipath_hash+0x1f0/0x1830 [ 436.347723][ C1] ? __pfx_ip6_pol_route+0x10/0x10 [ 436.352844][ C1] ? __pfx_rt6_multipath_hash+0x10/0x10 [ 436.358405][ C1] ? __pfx_ip6_pol_route_input+0x10/0x10 [ 436.364042][ C1] fib6_rule_lookup+0x536/0x720 [ 436.368903][ C1] ? ip6t_do_table+0xd50/0x1d40 [ 436.373759][ C1] ? __pfx_fib6_rule_lookup+0x10/0x10 [ 436.379135][ C1] ? nf_nat_ipv6_fn+0x103/0x2e0 [ 436.383990][ C1] ? __pfx_nf_nat_ipv6_fn+0x10/0x10 [ 436.389193][ C1] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 436.395096][ C1] ip6_route_input+0x663/0xc10 [ 436.399866][ C1] ? __pfx_ip6_route_input+0x10/0x10 [ 436.405162][ C1] ? __pfx_lock_release+0x10/0x10 [ 436.410185][ C1] ? trace_lock_acquire+0x14a/0x1d0 [ 436.415405][ C1] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 436.420613][ C1] ip6_rcv_finish_core.constprop.0+0x1a0/0x5d0 [ 436.426774][ C1] ipv6_rcv+0x1e4/0x680 [ 436.430936][ C1] ? __pfx_ipv6_rcv+0x10/0x10 [ 436.435618][ C1] __netif_receive_skb_one_core+0x12e/0x1e0 [ 436.441519][ C1] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 436.447941][ C1] ? trace_lock_acquire+0x14a/0x1d0 [ 436.453164][ C1] ? process_backlog+0x3f1/0x15f0 [ 436.458199][ C1] ? process_backlog+0x3f1/0x15f0 [ 436.463229][ C1] __netif_receive_skb+0x1d/0x160 [ 436.468262][ C1] process_backlog+0x443/0x15f0 [ 436.473125][ C1] __napi_poll.constprop.0+0xb7/0x550 [ 436.478513][ C1] net_rx_action+0xa92/0x1010 [ 436.483202][ C1] ? __pfx_net_rx_action+0x10/0x10 [ 436.488311][ C1] ? __pfx_tmigr_handle_remote+0x10/0x10 [ 436.493945][ C1] ? run_timer_base+0x100/0x190 [ 436.498806][ C1] ? kvm_sched_clock_read+0x11/0x20 [ 436.504010][ C1] ? sched_clock+0x38/0x60 [ 436.508432][ C1] ? sched_clock_cpu+0x6d/0x4d0 [ 436.513293][ C1] handle_softirqs+0x213/0x8f0 [ 436.518063][ C1] ? __pfx_handle_softirqs+0x10/0x10 [ 436.523348][ C1] ? rcu_is_watching+0x12/0xc0 [ 436.528113][ C1] ? __pfx_run_ksoftirqd+0x10/0x10 [ 436.533222][ C1] ? smpboot_thread_fn+0x59d/0xa30 [ 436.538336][ C1] run_ksoftirqd+0x3a/0x60 [ 436.542752][ C1] smpboot_thread_fn+0x661/0xa30 [ 436.547712][ C1] ? __kthread_parkme+0x148/0x220 [ 436.552739][ C1] ? __pfx_smpboot_thread_fn+0x10/0x10 [ 436.558199][ C1] kthread+0x2c1/0x3a0 [ 436.562267][ C1] ? _raw_spin_unlock_irq+0x23/0x50 [ 436.567471][ C1] ? __pfx_kthread+0x10/0x10 [ 436.572065][ C1] ret_from_fork+0x45/0x80 [ 436.576477][ C1] ? __pfx_kthread+0x10/0x10 [ 436.581087][ C1] ret_from_fork_asm+0x1a/0x30 [ 436.585885][ C1] [ 436.932139][ C1] net_ratelimit: 28103 callbacks suppressed [ 436.932159][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 436.932405][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 436.938203][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 436.950575][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 436.962206][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 436.974363][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 436.985952][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 436.998309][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 437.009933][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.022146][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 441.942125][ C0] net_ratelimit: 35990 callbacks suppressed [ 441.942143][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 441.942163][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.948646][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 441.960253][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.972608][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 441.984246][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.996425][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 442.008038][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.020370][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:d6:3f:0d:04:21, vlan:0) [ 442.031991][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 443.203453][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 [ 443.216599][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 [ 444.185042][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 [ 444.198128][ T1297] ieee802154 phy1 wpan1: encryption failed: -22